A heap‑based buffer overflow found in Microsoft Excel, tracked as CVE‑2025‑53741, has been published in Microsoft's Security Update Guide as a vulnerability that can allow an attacker to execute code on a victim machine when a crafted spreadsheet is opened; administrators and users should treat...
Microsoft has published a security advisory for CVE-2025-53730, a use‑after‑free vulnerability in Microsoft Office Visio that Microsoft describes as allowing an unauthorized attacker to execute code locally when a specially crafted Visio file is opened.
Background
Microsoft Visio is a widely...
A new wave of highly sophisticated phishing scams has placed millions of Microsoft 365 users at increased risk, with recent campaigns focusing on colleges and universities such as Seton Hall. These scams exploit a deepening trust in digital communications and modern security tools, employing...
A new wave of cybersecurity incidents and industry responses has dominated headlines in recent days, reshaping the risk landscape for businesses and consumers alike. From the hijacking of AI-driven smart homes to hardware-level battles over national security and software supply chain attacks...
Threat actors have escalated their tactics by exploiting the Microsoft 365 Direct Send feature, fundamentally altering the landscape of email-based cyber attacks. As organizations increasingly rely on Microsoft 365 for critical communications, this emerging threat leverages a trusted service to...
Cybersecurity researchers have uncovered a sophisticated phishing campaign exploiting Microsoft 365's Direct Send feature to deliver internal-looking emails without authentication. This method allows attackers to bypass traditional email security measures, posing significant risks to...
The evolution of phishing campaigns in the cloud era has introduced a new breed of attacks that are increasingly hard to spot, even for seasoned security professionals. Among these, a recent campaign targeting Microsoft 365 logins stands out for its cunning use of Microsoft OAuth applications...
Phishing campaigns have always shaped themselves around the contours of new technology, but the latest surge targeting Microsoft OAuth applications marks a seismic shift in both attacker strategy and the effectiveness of their exploits. In 2025, security researchers uncovered a wave of hybrid...
Sophisticated cyber adversaries have shifted tactics in recent months, exploiting fake Microsoft OAuth applications in tandem with advanced phishing toolkits such as Tycoon and ODx to compromise Microsoft 365 accounts worldwide. These attacks, tracked by researchers and security vendors...
Attackers are rapidly evolving their playbook in the ongoing battle over account security, and the latest threat landscape facing Microsoft 365 users underscores just how sophisticated these threats have become. Cybersecurity firm Proofpoint recently sounded the alarm on a new tier of phishing...
In a rapidly evolving cybersecurity landscape, defenders continually play catch-up as threat actors devise innovative ways to evade detection, exploit trust, and steal sensitive information. A recent revelation by cybersecurity researchers highlights a sophisticated phishing campaign targeting...
Phishing remains one of the most persistent and rapidly evolving threats within the digital landscape, and recent findings from Check Point Research (CPR) underscore how attackers are constantly updating their strategies to take advantage of shifting user habits and the immense popularity of...
In recent developments, cybersecurity researchers have uncovered a sophisticated phishing toolkit named PoisonSeed, designed to circumvent the robust protections offered by FIDO2 authentication. This malicious tool targets users of Microsoft 365, Google Workspace, and Okta by redirecting their...
Attackers are upping their game in the world of phishing, combining the power of artificial intelligence and native cloud tools to build attacks that are nearly indistinguishable from legitimate IT workflows. The latest trend, “native phishing,” leverages trusted Microsoft 365 (M365)...
The United Kingdom’s arrest of four suspects linked to a wave of cyberattacks targeting major retail organizations marks a pivotal moment in the ongoing battle between law enforcement and cybercriminals. This high-profile case comes at a time when digital threats are becoming increasingly...
cross-border investigations
cyber attack response
cyber law
cyber risk
cyber threat intelligence
cybercrime prevention
cybercriminals
cybersecurity
dark web
data breach
digital forensics
international cooperation
law enforcement
phishing
public-private partnership
ransomware
retail security
threat detection
uk retail cyberattacks
In recent years, the cybersecurity landscape has witnessed a dramatic escalation in identity-based attacks, with employee login credentials becoming prime targets for cybercriminals. This surge is largely attributed to the proliferation of sophisticated yet affordable tools that facilitate such...
A new era of phishing is underway, and the stakes have never been higher for organizations relying on Microsoft 365, Okta, and similar cloud-driven services. The weaponization of artificial intelligence, most recently exemplified by the abuse of Vercel’s v0 generative AI design tool, has made it...
There’s a growing threat in the digital landscape that preys on trust rather than technical vulnerability. It slips quietly into our daily lives, masquerading not as suspicious spam, but as the kind of corporate communication we expect: a calendar invite. For millions of Microsoft 365 and...
In May 2025, cybersecurity researchers at Varonis Threat Labs uncovered a sophisticated phishing campaign exploiting Microsoft 365's Direct Send feature. This attack has targeted over 70 organizations, with 95% based in the United States, across sectors such as financial services, manufacturing...
Hackers are increasingly exploiting one of Microsoft 365’s lesser-known conveniences—Direct Send—to launch sophisticated phishing campaigns that closely mimic internal communications, putting even well-defended organizations at serious risk. As recent research from Varonis and corroborating...