security vulnerabilities

  1. Copilot Audit-Log Gap: Prompts That Skip Purview Entries Revealed

    A security researcher’s routine Copilot query revealed a startling blind spot in Microsoft’s logging: under certain prompts, Copilot could return file summaries without leaving the expected Purview audit entry — and, according to the researcher, Microsoft quietly rolled out a fix without issuing...
  2. CVE-2025-7532: Local Token Leakage in FactoryTalk Action Manager

    A local information-disclosure flaw in Rockwell Automation’s FactoryTalk Action Manager allows unauthenticated local clients to receive a reusable API token broadcast over a WebSocket, creating a pathway for attackers with local access to intercept credentials and manipulate the product’s...
  3. Windows Hello Vulnerability: Biometric Security Under Threat at Black Hat 2025

    Windows Hello, long touted as the seamless and secure future of biometric login for Windows users, now finds itself under intense scrutiny following a dramatic live demonstration at this year’s Black Hat security conference in Las Vegas. Two German researchers unveiled a critical vulnerability...
  4. Critical Hybrid Exchange Vulnerability (CVE-2025-53786): Protect Your Organization Today

    A high-severity security vulnerability has emerged at the heart of countless enterprise communications: Microsoft has issued a warning about a flaw in hybrid Exchange Server deployments that could give cyber attackers undetected escalated access to Exchange Online—potentially undermining the...
  5. Windows 11 June 2025 KB5060999 Update: Security Fixes & Known Issues

    Here is a summary of the main points from the official Microsoft support article for the June 10, 2025—KB5060999 (OS Builds 22621.5472 and 22631.5472) cumulative update for Windows 11: Applies to Windows 11 Enterprise and Education, version 22H2 Windows 11 version 23H2, all editions...
  6. Windows 10 End of Support 2025: How to Extend Security Updates and Prepare for Migration

    As the October 14, 2025, end-of-support date for Windows 10 approaches, Microsoft has introduced options to extend security updates for users who are not yet ready to transition to Windows 11. This development is crucial for the millions of users still operating on Windows 10, ensuring continued...
  7. Cyberattack Surge Exploiting Trusted Email Link Wrapping to Steal Microsoft 365 Credentials

    A new wave of cyberattacks has exposed a dangerous flaw in trusted email security services, as hackers have successfully exploited protective link-wrapping features to orchestrate large-scale phishing campaigns targeting Microsoft 365 logins. By hijacking the mechanisms designed to keep users...
  8. 2025 Phishing Campaign Exploiting Trusted Email Security Tools and Link Wrapping

    A sophisticated phishing campaign exploiting trusted email security tools has rattled the cybersecurity landscape, exposing a dismally clever strategy that turns protective mechanisms into attack vectors. Between June and July 2025, researchers at Cloudflare uncovered an operation wherein...
  9. Exposing the Hidden Threat of Microsoft 365's Direct Send Abuse in Internal Phishing Campaigns

    Leveraging trusted internal channels has long been a gold standard for cybercriminals seeking to evade organizational defenses, but a recent campaign uncovered by Proofpoint signals a new level of ingenuity in exploiting a familiar Microsoft 365 feature: Direct Send. This functionality, designed...
  10. End of Windows 10 Support 2025: Your Guide to Upgrade, Transition, and Security

    As the end of support for Windows 10 approaches on October 14, 2025, users are faced with critical decisions regarding their computing future. Continuing to use Windows 10 beyond this date means no longer receiving security updates, bug fixes, or technical support from Microsoft, which could...
  11. Sploitlight CVE-2025-31199: The Cross-Platform macOS Vulnerability Exposing Privacy Risks

    In the ongoing arms race between tech giants, software vulnerabilities are increasingly weaponized not only by cybercriminals but by the vendors themselves in the battle for narrative control. Microsoft’s recent public exposure of a serious macOS security flaw—dubbed "Sploitlight" and tracked as...
  12. Windows 10 Extended Security Updates (ESU): How to Enroll & Stay Protected Until 2026

    Microsoft has announced an extension of security updates for Windows 10 users through the Extended Security Updates (ESU) program, allowing continued support until October 13, 2026. This initiative provides critical and important security updates for devices running Windows 10, version 22H2...
  13. Critical Windows Server 2025 Flaw 'Golden dMSA' Threatens Active Directory Security

    Here’s a summary of the breaking news reported by Semperis about a critical design flaw, called Golden dMSA, affecting Windows Server 2025: What is Golden dMSA? Golden dMSA is a critical design flaw found in Delegated Managed Service Accounts (dMSA) within Windows Server 2025. The flaw exposes...
  14. Mitigating CVE-2022-44693: Protect Your Microsoft SharePoint Server from Critical Remote Code Execution Vulnerability

    Microsoft SharePoint Server has been a cornerstone for enterprise collaboration, offering a robust platform for document management, content sharing, and team collaboration. However, its widespread adoption also makes it a prime target for cyber threats. One such significant vulnerability is...
  15. Open Source Security: Trust, Vulnerabilities, and the Human Factor in Digital Safety

    Open source software has long been championed as a beacon of superior security in the software landscape, often celebrated for its transparency, the rigour of peer review, and the almost mythic effect of "many eyeballs" catching bugs before they do harm. This foundational belief, rooted in the...
  16. Microsoft's China Support Scandal Risks US National Security & Cloud Security Strategies

    The abrupt policy change by Microsoft to sever technical support ties between its China-based engineers and US defense clients has sent shockwaves across the tech and national security sectors, exposing the intricate web of challenges faced when securing critical digital infrastructure in a...
  17. Microsoft Stops Using China-Based Engineers for U.S. DoD Cloud Support to Enhance Security

    Microsoft's recent decision to cease utilizing China-based engineers for supporting the U.S. Department of Defense's (DoD) cloud computing systems marks a significant shift in its operational practices. This move follows investigative reports highlighting potential security vulnerabilities...
  18. Apple Sues YouTuber and Analyst Over Leaked iOS 26 Secrets in Data Breach Case

    Apple has initiated legal proceedings against YouTuber Jon Prosser and tech analyst Michael Ramacciotti, alleging unauthorized access and dissemination of confidential information regarding the upcoming iOS 26 operating system. The lawsuit, filed in the U.S. District Court for the Northern...
  19. Microsoft Extends Support for Exchange & Skype Servers—Urgent Migration Ahead

    For IT administrators and business leaders still running on-premises Exchange Server or Skype for Business servers, the coming months signal a period of both opportunity and urgency. Microsoft has announced a crucial extension in support for select versions of these workplace cornerstones...
  20. Final Fantasy XIV to Drop Windows 10 Support in October 2025: What Gamers Need to Know

    Square Enix has officially confirmed that support for Final Fantasy XIV (FFXIV) on Windows 10 will come to an end on October 14, 2025, a date synchronizing precisely with Microsoft’s own termination of security updates for the aging operating system. For millions of FFXIV players on PC, this...