threat hunting

  1. CVE-2025-50171: Remote Desktop Missing Authorization Spoofing - Admins Guide

    Title: CVE-2025-50171 — Remote Desktop "Missing authorization" (spoofing) vulnerability — what admins must know and do now TL;DR (quick action checklist) This CVE (CVE-2025-50171) is a Microsoft-reported vulnerability in Remote Desktop Server described as a “missing authorization” that allows...
  2. CVE-2025-50170: Local EoP in Windows Cloud Files Driver (cldflt.sys) Patch Now

    Microsoft has published an advisory for CVE-2025-50170, a local elevation-of-privilege (EoP) vulnerability in the Windows Cloud Files Mini Filter Driver (cldflt.sys) that—when reached by a local, authorized attacker—can be abused to obtain higher privileges on affected machines. The flaw stems...
  3. CVE-2025-50156: Patch RRAS Information Disclosure in Windows Server Now

    Title: CVE-2025-50156 — Windows Routing and Remote Access Service (RRAS) Information Disclosure (Uninitialized Resource) Executive summary What happened: An information-disclosure vulnerability (CVE-2025-50156) was reported in Windows Routing and Remote Access Service (RRAS). The flaw is caused...
  4. CVE-2025-49762: AFD.sys Race Condition Enables Local Privilege Escalation

    A recently published Microsoft advisory warns that CVE-2025-49762 — a race-condition flaw in the Windows Ancillary Function Driver for WinSock (AFD.sys) — can allow a locally authorized attacker to elevate privileges by exploiting concurrent execution using a shared resource with improper...
  5. Patch CVE-2025-53772: Secure Web Deploy (MSDeploy) Now

    TL;DR — Microsoft has published a security advisory for CVE-2025-53772: a deserialization vulnerability in Web Deploy (msdeploy) that can allow an authenticated (authorized) user who can reach the Web Deploy endpoint to cause remote code execution on the target server. If you run Web Deploy (the...
  6. SQL Server CVE-2025-24999: Elevation of Privilege via Improper Access Control

    Microsoft has posted an advisory for CVE-2025-24999, an Elevation of Privilege (EoP) vulnerability affecting Microsoft SQL Server that Microsoft characterizes as an improper access control issue which can allow an authorized but lower-privilege user to elevate their privileges across the...
  7. Dow's AI-Enhanced CSOC: Accelerating Security Operations with Generative AI

    Dow’s security team has quietly rewritten the playbook for a 125‑year‑old materials science giant by folding generative AI into daily operations — not as a flashy headline, but as a force multiplier that shortens investigation times, elevates junior analysts, and reshapes incident response...
  8. Thorium: Open-Source Platform Revolutionizing Malware Analysis & Threat Intelligence

    The launch of Thorium, the open-source malware analysis platform unveiled by the Cybersecurity and Infrastructure Security Agency (CISA), marks a significant milestone in the evolution of threat intelligence and response capabilities for organizations worldwide. With cyberattacks growing in...
  9. Enhancing Critical Infrastructure Security: Proven Strategies for Robust Cyber Hygiene in 2024

    In early 2024, a proactive collaboration between the Cybersecurity and Infrastructure Security Agency (CISA) and the United States Coast Guard (USCG) brought renewed scrutiny to the state of cyber hygiene across America’s critical infrastructure. The joint threat hunt, conducted at the behest of...
  10. Secret Blizzard’s Advanced Cyber Espionage Campaign Targeting Moscow Embassies

    Diplomatic missions working in Moscow now face a newly exposed, advanced cyber threat: Secret Blizzard’s adversary-in-the-middle (AiTM) campaign, designed to penetrate even the most security-conscious organizations. According to detailed analysis from Microsoft Threat Intelligence, this Russian...
  11. Thorium: The Scalable, Automated Platform Transforming Cybersecurity File Analysis

    Unveiling Thorium: A Game-Changer for Automated File Analysis and Scalable Cybersecurity Workflows Barely a day passes in the modern cyber landscape without organizations facing sophisticated malware, new vulnerabilities, and relentless digital forensics challenges. Against this relentless wave...
  12. Empowering Thailand’s Cybersecurity: Microsoft-backed CTF Boosts Digital Defense Skills

    In today’s hyper-connected world, the escalation in cyber-attacks is relentlessly testing enterprise resilience. As organizations digitize operations at an unprecedented pace and rely more heavily on cloud-based systems, the sophistication of bad actors advances in tandem, pushing the limits of...
  13. Microsoft Sentinel Data Lake: The Future of Unified Security Data Management

    The landscape of cybersecurity is rapidly evolving, shaped by an ever-expanding volume of data, increasingly sophisticated threats, and the relentless pace of digital transformation. Security operations centers (SOCs) and IT administrators face a recurring and persistent challenge: unifying...
  14. Critical SharePoint Vulnerability CVE-2025-53770: How to Protect Your Organization

    In recent days, a significant cybersecurity incident has emerged, targeting Microsoft SharePoint servers worldwide. This attack exploits a newly identified vulnerability, CVE-2025-53770, allowing unauthorized remote code execution on on-premises SharePoint servers. The breach has affected...
  15. Golden dMSA Vulnerability in Windows Server 2025: What You Need to Know

    A pivotal security development has emerged from the world of enterprise identity management: a critical flaw has been identified in delegated Managed Service Accounts (dMSA) within Windows Server 2025. This vulnerability, discovered and named the “Golden dMSA” attack by Semperis security...
  16. Huntress and Microsoft Collaborate to Strengthen SMB Cybersecurity and Optimize Security Investments

    In a significant move to enhance cybersecurity for businesses, Huntress has announced a collaboration with Microsoft aimed at empowering organizations to combat modern threats while maximizing their existing security investments. This partnership seeks to address the challenges many businesses...
  17. Protect Your Organization: Microsoft Defender's New Mail Bombing Detection Feature

    Email bombing, a form of cyberattack where attackers flood a target's inbox with a massive volume of emails, has become an increasingly prevalent threat. This tactic aims to overwhelm users, making it challenging to access legitimate communications and potentially disrupting organizational...
  18. Microsoft Defender's New Email Bombing Detection Enhances Enterprise Email Security

    As email-based threats continue to evolve in both scope and sophistication, organizations leveraging Microsoft’s business productivity suite face a relentless challenge: how to protect their workforce—and their most sensitive data—from increasingly novel attack tactics. One such cybercrime...
  19. Mitigating the Microsoft 365 Direct Send Phishing Attack: A Comprehensive Guide

    Microsoft 365 tenants across the United States have recently become the focal point of a sophisticated, widespread phishing campaign that leverages a rarely-discussed but highly impactful vulnerability in Exchange Online’s Direct Send feature. Security researchers have confirmed that, since May...
  20. Microsoft Defender XDR Boosts Security with AI-Driven TITAN and Copilot Integration

    Microsoft’s relentless pursuit of proactive security innovation has taken a substantial leap forward with the recent upgrade to Microsoft Defender XDR, which now integrates advanced Copilot-driven technology and the newly introduced TITAN recommendations system. This enhancement signals a...