threat detection

  1. Sophos and Rubrik Transform Microsoft 365 Cyber Resilience with Integrated Backup and Recovery

    In a joint move reshaping cyber resilience for cloud productivity suites, Sophos and Rubrik have unveiled a backup and recovery solution specifically optimized for Managed Detection and Response (MDR) environments running Microsoft 365. This innovative partnership brings Sophos M365 Backup and...
  2. Rubrik and Sophos Partnership Revolutionizes Microsoft 365 Cyber Resilience and Data Recovery

    Rubrik and Sophos have unveiled a formidable partnership aimed at advancing cyber resilience for Microsoft 365, positioning their unified solution as a significant leap in secure data protection and rapid recovery. This alliance introduces "Sophos Microsoft 365 Backup and Recovery Powered by...
  3. Revolutionizing Microsoft 365 Cyber Resilience with Rubrik and Sophos Partnership

    A new era of cyber resilience for Microsoft 365 has arrived as Rubrik and Sophos announce a landmark partnership designed to redefine how organizations protect, recover, and govern their cloud data assets. By bringing together Rubrik’s advanced data security and recovery capabilities with...
  4. Africa’s Cloud Security Revolution: Overe.io & PRODATA Partner to Empower Microsoft 365 Defense

    As Africa’s digital landscape experiences unprecedented growth, a new alliance between Overe.io and PRODATA promises to usher in a transformative approach to Microsoft 365 security for channel partners across the continent. This strategic partnership aims to empower managed service providers...
  5. New Microsoft 365 Phishing Attacks Bypass 2FA via OAuth Abuse in 2025

    A rapidly escalating security threat has emerged for organizations relying on Microsoft 365, as hackers have devised sophisticated phishing campaigns that can bypass even two-factor authentication (2FA) protections. Since the beginning of 2025, attackers have compromised nearly 3,000 accounts...
  6. Mitigating Microsoft 365 Phishing Attacks via SMTP Relay Exploitation

    Cybercriminals have ramped up efforts to exploit Microsoft 365’s Direct Send feature and unsecured SMTP relays, launching sophisticated phishing campaigns that masquerade as internal company emails—placing even vigilant organizations at substantial risk. According to recent research by...
  7. Thorium: Open-Source Platform Revolutionizing Malware Analysis & Threat Intelligence

    The launch of Thorium, the open-source malware analysis platform unveiled by the Cybersecurity and Infrastructure Security Agency (CISA), marks a significant milestone in the evolution of threat intelligence and response capabilities for organizations worldwide. With cyberattacks growing in...
  8. Exposing the Hidden Threat of Microsoft 365's Direct Send Abuse in Internal Phishing Campaigns

    Leveraging trusted internal channels has long been a gold standard for cybercriminals seeking to evade organizational defenses, but a recent campaign uncovered by Proofpoint signals a new level of ingenuity in exploiting a familiar Microsoft 365 feature: Direct Send. This functionality, designed...
  9. Protecting Microsoft 365 from Internal Phishing via Direct Send Exploits

    Threat actors are increasingly exploiting Microsoft 365’s Direct Send feature to conduct highly convincing internal phishing campaigns, eroding trust within organizations and challenging the efficacy of traditional security defenses. This emergent attack vector, recently highlighted by...
  10. Comparing Microsoft Defender for Office 365 and ICES Solutions for Enhanced Email Security

    In the ever-evolving landscape of cybersecurity, email remains a primary vector for attacks such as phishing, malware, and business email compromise (BEC). To bolster defenses, organizations often deploy a combination of native security solutions and third-party tools. Microsoft Defender for...
  11. 2025 Microsoft OAuth Phishing Surge: How Attackers Bypass MFA and Compromise Cloud Security

    Phishing campaigns have always shaped themselves around the contours of new technology, but the latest surge targeting Microsoft OAuth applications marks a seismic shift in both attacker strategy and the effectiveness of their exploits. In 2025, security researchers uncovered a wave of hybrid...
  12. BlinkOps and Microsoft Sentinel Revolutionize Cybersecurity Automation with No-Code Integration

    In a significant advancement for cybersecurity operations, BlinkOps has partnered with Microsoft to integrate its agentic security automation platform directly with Microsoft Sentinel. This collaboration enables organizations to swiftly create and deploy no-code, deterministic workflows in...
  13. Critical VMware Vulnerabilities in Rockwell Automation's Lifecycle Services Pose Major Industrial Cyber Risks

    Rockwell Automation’s Lifecycle Services—with key offerings powered by VMware—have become foundational in modernizing industrial infrastructures, integrating both critical manufacturing systems and advanced cybersecurity managed services at global scale. Yet as these digital transformation...
  14. Advanced Multi-Layer Redirect Phishing Attacks on Microsoft 365: How to Protect Your Organization

    In a rapidly evolving cybersecurity landscape, defenders continually play catch-up as threat actors devise innovative ways to evade detection, exploit trust, and steal sensitive information. A recent revelation by cybersecurity researchers highlights a sophisticated phishing campaign targeting...
  15. Secure Your Microsoft 365 Identity Layer: Strategies to Prevent Cyberattacks

    Identity has rapidly become the new battleground in the fight for organizational security, especially as cybercriminals innovate to sidestep robust perimeter defenses. While firewalls, endpoint protection, and phishing detection continuously improve, attackers are leveraging stolen or...
  16. AI-Powered Data Security: Proactive Strategies to Protect Sensitive Information

    In a digital landscape increasingly defined by sophisticated and relentless cyberattacks, the stakes for protecting sensitive data have never been higher. High-profile breaches continue to make headlines, regulations become stricter, and the financial and reputational costs of a data leak can...
  17. Microsoft Power Pages Security Agent: AI-Driven Web Protection in Public Preview

    Securing modern web platforms remains one of the most complex challenges for organizations, regardless of size or sector. With the rapid proliferation of low-code solutions like Power Pages, the challenge only grows as more non-expert users become responsible for workplace applications, many of...
  18. Mitigating Indirect Prompt Injection in Large Language Models: Microsoft's Defense Strategies

    Large language models are propelling a new era in digital productivity, transforming everything from enterprise applications to personal assistants such as Microsoft Copilot. Yet as enterprises and end-users rapidly embrace LLM-based systems, a distinctive form of adversarial risk—indirect...
  19. July 2025 ICS Cybersecurity Advisories: Protecting Industrial Control Systems from Emerging Threats

    The cybersecurity landscape for industrial control systems (ICS) continues to evolve at a rapid pace, with new vulnerabilities emerging as digital transformation penetrates operational environments. On July 29, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) took another...
  20. Microsoft Entra ID Introduces Linkable Token Identifiers to Strengthen Enterprise Security

    Microsoft is heralding a new era for enterprise identity security with the general availability of linkable token identifiers in Entra ID, the latest upgrade to its modern identity platform. This innovation is designed to combat one of the most persistent challenges in cybersecurity: the...