An alarming new wave of cybercrime has emerged, leveraging the very security tools designed to shield organizations from harm. Recent research reveals that phishing actors are now abusing link-wrapping and URL-rewriting services—trusted pillars of enterprise email protection—to sneak malicious...
The evolution of phishing campaigns in the cloud era has introduced a new breed of attacks that are increasingly hard to spot, even for seasoned security professionals. Among these, a recent campaign targeting Microsoft 365 logins stands out for its cunning use of Microsoft OAuth applications...
Password spraying attacks have become one of the most persistent and damaging techniques in the arsenal of modern cybercriminals, as demonstrated by a newly disclosed incident in which over 80,000 Microsoft Entra ID accounts were targeted using legitimate penetration testing tools. According to...
As Microsoft continues its campaign to tighten security across its productivity platforms, Outlook users will soon notice new restrictions designed to combat sophisticated phishing attacks and malware infiltration attempts. Beginning July 2025, the company will expand the list of blocked file...
At OffensiveCon 2025, held at the Hilton Berlin, security researchers presented a groundbreaking analysis titled "Hunting For Overlooked Cookies In Windows 11 KTM And Baking Exploits For Them." This presentation delved into the intricacies of the Windows 11 Kernel Transaction Manager (KTM)...
A new wave of cyberattacks has emerged, sending ripples across the digital landscape, and it is targeting one of the world’s most widely adopted productivity ecosystems—Microsoft 365. At the center of this ongoing threat is a campaign linked to Tycoon2FA, a notorious Phishing-as-a-Service...
Windows Server Message Block (SMB) vulnerabilities consistently make headlines due to their profound impact on enterprise environments, end-user privacy, and the evolving cybersecurity landscape. The recent disclosure and patching of CVE-2025-29956—a buffer over-read vulnerability in Windows...
advancedthreats
buffer over-read
buffer overflow
credential management
cybersecurity
enterprise security
information disclosure
insider threats
it infrastructure
lateral movement
memory safety
microsoft patch
network security
patch management
security best practices
smb vulnerability
threat mitigation
vulnerability management
windows security
windows server
The recent disclosure of CVE-2025-29837, a Windows Installer information disclosure vulnerability categorized under 'improper link resolution before file access' (also known as 'link following'), brings renewed scrutiny to the mechanisms governing resource management and security within the...
advancedthreats
cve-2025-29837
endpoint security
file security
information disclosure
it infrastructure security
malware prevention
patch management
privilege escalation
security best practices
security community
security updates
symbolic link exploit
symlink exploits
system hardening
temporary directory security
vulnerabilities
windows installation
windows security
windows vulnerabilities
Microsoft Excel, the spreadsheet application often taken for granted as just another productivity tool, is once again at the center of a critical cybersecurity discussion. The newly disclosed CVE-2025-30381 exposes a significant remote code execution (RCE) vulnerability in Microsoft Excel...
Microsoft's March 2025 Patch Tuesday brought an extensive lineup of bug fixes, but among these was a vulnerability that would quickly escalate into a significant security incident: CVE-2025-24054, an NTLM hash-leaking flaw. While Microsoft initially considered this vulnerability "less likely" to...
In a fast-evolving digital threat landscape, even the most fundamental and trusted layers of operating system architecture can become primary targets. This reality has been thrust into the spotlight yet again by the discovery and subsequent analysis of the Windows Update Stack...
One recent morning, Nick Johnson did what many of us do: scanned his inbox, eyes glazed, sifting spam from signal. Then he spotted what looked like a run-of-the-mill Google security alert—legit sender address, DKIM check passed, sorted neatly with his real security alerts. The message: Google...
Microsoft announced on Monday that Microsoft Defender for Endpoint now supports Windows 10 on Arm devices. This expanded support is part of the company’s efforts to extend these capabilities across endpoints. Arm devices are designed to take full advantage of the protections available in Windows...
advancedthreats
antimalware
antivirus
arm devices
capabilities
cloud solutions
data security
defender
encryption
end users
endpoint management
enterprise
microsoft
productivity
security
support
threats
trial
user experience
windows 10
With Office 365, we continue to invest in new protections against malicious email attacks. Today Shobhit Sahay from the Office 365 team walks through seven new Exchange Online Protection (EOP) and Advanced Threat Protection (ATP) features that proactively identify and block the most dangerous...