defense strategies

  1. Evolving Cloud Phishing Tactics: How Attackers Exploit Microsoft OAuth and AI-Driven Techniques

    The evolution of phishing campaigns in the cloud era has introduced a new breed of attacks that are increasingly hard to spot, even for seasoned security professionals. Among these, a recent campaign targeting Microsoft 365 logins stands out for its cunning use of Microsoft OAuth applications...
  2. Urgent Security Alert: CVE-2025-53770 Exploited in SharePoint Server Zero-Day Vulnerability

    A critical zero-day vulnerability, identified as CVE-2025-53770, has been actively exploited in Microsoft's on-premises SharePoint Server, compromising approximately 100 organizations globally. This flaw allows unauthenticated attackers to execute remote code, granting them full control over...
  3. Urgent Security Alert: Protect SharePoint Servers from CVE-2025-53770 Exploits

    Microsoft has recently issued an urgent security alert concerning active cyberattacks targeting on-premises SharePoint servers. These attacks exploit a previously unknown vulnerability, designated as CVE-2025-53770, which allows unauthorized remote code execution on affected systems. The...
  4. Critical Flaw in Windows Server 2025: Golden dMSA Vulnerability and Defense Strategies

    Here’s a summary of the critical findings from Semperis regarding Windows Server 2025 and the new design flaw: Golden dMSA Flaw Overview What is Golden dMSA? Golden dMSA is a critical design flaw in delegated Managed Service Accounts (dMSA) in Windows Server 2025. It allows attackers to...
  5. Critical Windows Server 2025 Flaw 'Golden dMSA' Allows Persistent Attacks

    Here’s a summary of the critical flaw "Golden dMSA" in Windows Server 2025 reported by Semperis: What is Golden dMSA? Golden dMSA is a newly discovered, critical design flaw in delegated Managed Service Accounts (dMSA) on Windows Server 2025. Discovered by: Semperis, a security research and...
  6. Playcrypt Ransomware Group: Evolving Threats, Attack Tactics, and Defense Strategies in 2025

    The Play ransomware group, more commonly referred to in cybersecurity circles as “Playcrypt,” has carved out a chilling reputation across the digital threat landscape since its emergence in mid-2022. This ransomware-as-a-service operation has evolved from relative obscurity to become one of the...
  7. Simple Cyber Attacks on Critical Infrastructure: Protecting U.S. Energy and Transportation Sectors

    In recent months, a concerning trend has emerged within U.S. critical infrastructure: unsophisticated cyber actors have increasingly targeted industrial control systems (ICS) and supervisory control and data acquisition (SCADA) networks, particularly those underpinning the nation’s Energy and...
  8. Why Identity Is the New Security Perimeter in 2024: Strategies to Protect Modern Enterprises

    Identity-based cyberattacks have rapidly emerged as one of the most pressing security challenges facing organizations in 2024 and beyond. As digital transformation accelerates, shifting workforces to remote and hybrid models and driving deeper cloud adoption, the boundaries that once defined...
  9. Customer Guidance for WannaCrypt attacks

    Microsoft solution available to protect additional products Today many of our customers around the world and the critical systems they depend on were victims of malicious “WannaCrypt” software. Seeing businesses and individuals affected by cyberattacks, such as the ones reported today, was...
  10. TA17-117A: Intrusions Affecting Multiple Victims Across Multiple Sectors

    Original release date: April 27, 2017 Systems Affected Networked Systems Overview The National Cybersecurity and Communications Integration Center (NCCIC) has become aware of an emerging sophisticated campaign, occurring since at least May 2016, that uses multiple malware implants. Initial...