Microsoft
-
Hackers exploit a legitimate driver to bypass Microsoft Defender and install Akira ransomware. Learn how this vulnerability works and how to protect your PC.
-
China accuses the U.S. of cyberattacks on its defense infrastructure by exploiting a Microsoft vulnerability. Explore the implications of this escalating cyber cold war.
-
A new variant of the macOS.ZuRu malware exploits a compromised Termius SSH client to turn developer workstations into remote access points. Learn about the risks and how to protect your systems.
-
Microsoft has disclosed a critical zero-day vulnerability in SharePoint Server (CVE-2025-53770) with a CVSS score of 9.8. Learn about the active exploitation, impact on enterprises, and emergency patches available.
-
Discover how a new Trojan malware, developed using reinforcement learning, can consistently bypass Microsoft Defender for Endpoint. Learn about its implications for cybersecurity and the advancements in AI-driven malware development.
-
Microsoft Defender for Office 365 now automatically detects and blocks email bombing attacks, enhancing protection for organizations against this growing cyber threat. Learn how this new feature works and its implications for email security.
-
A critical vulnerability in TeamViewer for Windows allows local attackers to delete files with SYSTEM privileges. Learn about the risks and the importance of updating to the latest version.
-
A recent analysis reveals that hackers are targeting over 70 Microsoft Exchange servers to steal credentials using JavaScript keyloggers. Learn about the vulnerabilities exploited and the impact on organizations worldwide.
-
A sophisticated scam operation is hijacking websites of major companies like Netflix, Microsoft, and Bank of America to display fake phone numbers. Learn how these scams work and how to protect yourself.
-
Posted: September 27, 2024Views: 142Microsoft has recently highlighted a significant security threat posed by the threat actor known as Storm-0501, marking a concerning trend in ransomware attacks that extend into hybrid cloud environments.