The evolution of phishing campaigns in the cloud era has introduced a new breed of attacks that are increasingly hard to spot, even for seasoned security professionals. Among these, a recent campaign targeting Microsoft 365 logins stands out for its cunning use of Microsoft OAuth applications...
A critical zero-day vulnerability, identified as CVE-2025-53770, has been actively exploited in Microsoft's on-premises SharePoint Server, compromising approximately 100 organizations globally. This flaw allows unauthenticated attackers to execute remote code, granting them full control over...
Microsoft has recently issued an urgent security alert concerning active cyberattacks targeting on-premises SharePoint servers. These attacks exploit a previously unknown vulnerability, designated as CVE-2025-53770, which allows unauthorized remote code execution on affected systems. The...
Here’s a summary of the critical findings from Semperis regarding Windows Server 2025 and the new design flaw:
Golden dMSA Flaw Overview
What is Golden dMSA?
Golden dMSA is a critical design flaw in delegated Managed Service Accounts (dMSA) in Windows Server 2025.
It allows attackers to...
Here’s a summary of the critical flaw "Golden dMSA" in Windows Server 2025 reported by Semperis:
What is Golden dMSA?
Golden dMSA is a newly discovered, critical design flaw in delegated Managed Service Accounts (dMSA) on Windows Server 2025.
Discovered by: Semperis, a security research and...
active directory
brute force attack
cyber threats
cybersecurity
defensestrategies
digital forensics
directory services
golden dmsa
identity security
lateral movement
malicious access
managed service accounts
microsoft flaws
password crack
security breach
security research
security vulnerability
semperis
vulnerability disclosure
windows server 2025
The Play ransomware group, more commonly referred to in cybersecurity circles as “Playcrypt,” has carved out a chilling reputation across the digital threat landscape since its emergence in mid-2022. This ransomware-as-a-service operation has evolved from relative obscurity to become one of the...
In recent months, a concerning trend has emerged within U.S. critical infrastructure: unsophisticated cyber actors have increasingly targeted industrial control systems (ICS) and supervisory control and data acquisition (SCADA) networks, particularly those underpinning the nation’s Energy and...
Identity-based cyberattacks have rapidly emerged as one of the most pressing security challenges facing organizations in 2024 and beyond. As digital transformation accelerates, shifting workforces to remote and hybrid models and driving deeper cloud adoption, the boundaries that once defined...
Microsoft solution available to protect additional products
Today many of our customers around the world and the critical systems they depend on were victims of malicious “WannaCrypt” software. Seeing businesses and individuals affected by cyberattacks, such as the ones reported today, was...
antivirus
custom support
cybersecurity
defensestrategies
it security
malware
malware protection center
microsoft
patch management
phishing
ransomware
security
system protection
update
vulnerability
wannacrypt
windows 8
windows defender
windows server 2003
windows xp
Original release date: April 27, 2017
Systems Affected
Networked Systems
Overview
The National Cybersecurity and Communications Integration Center (NCCIC) has become aware of an emerging sophisticated campaign, occurring since at least May 2016, that uses multiple malware implants. Initial...
attack vectors
credential theft
cybersecurity
data breach
defensestrategies
indicators of compromise
intrusion
it security
it service providers
malware
nccic
network security
network traffic
plugx
rat
redleaves
risk evaluation
threat actors
vulnerability
windows