Tag: microsoft
-
Microsoft Teams phishing targets employees with A0Backdoor malware
Hackers contacted employees at financial and healthcare organizations over Microsoft Teams to trick them into granting remote access through Quick Assist and deploy a new piece of malware called A0Backdoor. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/microsoft-teams-phishing-targets-employees-with-backdoors/
-
Microsoft Teams phishing targets employees with A0Backdoor malware
Hackers contacted employees at financial and healthcare organizations over Microsoft Teams to trick them into granting remote access through Quick Assist and deploy a new piece of malware called A0Backdoor. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/microsoft-teams-phishing-targets-employees-with-backdoors/
-
Microsoft Teams phishing targets employees with backdoors
Hackers contacted employees at financial and healthcare organizations over Microsoft Teams to trick them into granting remote access through Quick Assist and deploy a new piece of malware called A0Backdoor. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/microsoft-teams-phishing-targets-employees-with-backdoors/
-
Meta’s AI Safety Chief Couldn’t Stop Her Own Agent. What Makes You Think You Can Stop Yours?
Two incidents from the last two weeks of February need to be read together, because separately they look like cautionary anecdotes and together they look like a threat doctrine. Incident One: An autonomous bot called hackerbot-claw attacked seven major open-source repositories”, Microsoft, DataDog, the CNCF, and Trivy among them. It exploited a well-documented GitHub Actions…
-
Microsoft Teams will tag third-party bots trying to join meetings
Microsoft says Teams will soon automatically tag third-party bots in lobbies, allowing organizers to control whether they can join meetings. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/microsoft-teams-will-tag-third-party-bots-in-meeting-lobbies/
-
Microsoft still working to fix Windows Explorer white flashes
Microsoft has confirmed that it’s still working to fully address a known issue that causes bright white flashes when opening the File Explorer on some Windows 11 systems. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/microsoft-still-working-to-fix-windows-explorer-white-flashes/
-
Microsoft Azure CTO set Claude on his 1986 Apple II code, says it found vulns
This isn’t just a nostalgia trip billions of legacy microcontrollers may be at risk First seen on theregister.com Jump to article: www.theregister.com/2026/03/09/claude_legacy_code_vulns/
-
Microsoft Azure CTO set Claude on his 1986 Apple II code, says it found vulns
This isn’t just a nostalgia trip billions of legacy microcontrollers may be at risk First seen on theregister.com Jump to article: www.theregister.com/2026/03/09/claude_legacy_code_vulns/
-
Microsoft Azure CTO set Claude on his 1986 Apple II code, says it found vulns
This isn’t just a nostalgia trip billions of legacy microcontrollers may be at risk First seen on theregister.com Jump to article: www.theregister.com/2026/03/09/claude_legacy_code_vulns/
-
AI Bot Hackerbot-Claw Targets Microsoft, DataDog and CNCF GitHub Repos
Security firm Pillar reveals the Chaos Agent in which Hackerbot-Claw, an AI agent, used natural language to compromise major GitHub projects and hijack developer tools. First seen on hackread.com Jump to article: hackread.com/ai-bot-hackerbot-claw-microsoft-datadog-github-repos/
-
Fake AI Extensions Breached Chat Histories in 20,000+ Enterprise Tenants
Microsoft has issued an alert after uncovering a wave of malicious Chromium-based browser extensions masquerading as legitimate AI assistant tools. The extensions, available on the Chrome Web Store and compatible with both Google Chrome and Microsoft Edge, secretly collected private browser data and AI chat content. Microsoft found that stolen data included full URLs, internal site…
-
Microsoft kicks new Outlook opt-out deadline down the road to 2027
Tags: microsoftAdmins get another year before migration pressure ramps up First seen on theregister.com Jump to article: www.theregister.com/2026/03/06/microsoft_outlook_migration_postponed/
-
USENIX Security ’25 (Enigma Track) AI Red Teaming And Automation: Exploring Societal Risks In GenAI
Author, Creator & Presenter: Bolor-Erdene Jagdagdorj, Microsoft AI Red Team, Auto-Dubbed For Some Languages Was Automagically Generated Our thanks to USENIX Security ’25 (Enigma Track) (USENIX ’25 for publishing their Creators, Authors and Presenter’s tremendous USENIX Security ’25 (Enigma Track) content on the Organizations’ YouTube Channel. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/usenix-security-25-enigma-track-ai-red-teaming-and-automation-exploring-societal-risks-in-genai/
-
Hackers abusing AI at every stage of cyberattacks
Microsoft says threat actors are increasingly using artificial intelligence in their operations to accelerate attacks, scale malicious activity, and lower technical barriers across all aspects of a cyberattack. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/microsoft-hackers-abusing-ai-at-every-stage-of-cyberattacks/
-
Microsoft 365: Jedes zweite Unternehmen stoppt KI-Projekte
Für 82 Prozent stellt Microsoft 365 eine erhebliche operative Herausforderung dar, die mittels Automation noch nicht hinreichend adressiert werden kann. Jedes zweite Unternehmen stoppt KI-Projekte wegen Sicherheits- und Governance-Bedenken. 51 Prozent der Unternehmen weltweit haben KI-basierte Änderungen in Microsoft 365 aufgrund von Sicherheits- oder Governance-Bedenken rückgängig gemacht (Deutschland: 46 %). Gleichzeitig sehen knapp drei… First…
-
ClickFix attackers using new tactic to evade detection, says Microsoft
AppData\Local that is then invoked through cmd.exe to write a VBScript to %Temp%. The batch script is executed via cmd.exe with the /launched command-line argument, and is then executed again through MSBuild.exe, resulting in LOLBin abuse. The script connects to Crypto Blockchain RPC endpoints, indicating etherhiding technique, and also performs QueueUserAPC()-based code injection into chrome.exe…
-
Microsoft warns North Korean threat groups are scaling up fake worker schemes with generative AI
Attackers have turned AI into a “force multiplier” for the country’s expansive scheme to get and keep operatives hired at global companies, researchers said. First seen on cyberscoop.com Jump to article: cyberscoop.com/microsoft-north-korea-ai-operations/
-
Bitwarden Brings Passkey Logins to Windows 11, Expanding Passwordless Sign-Ins
Bitwarden now supports passkey logins on Windows 11 for Microsoft Entra ID users, extending passwordless sign-ins to device authentication. The post Bitwarden Brings Passkey Logins to Windows 11, Expanding Passwordless Sign-Ins appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-bitwarden-passkey-windows-11-sign-in/
-
North Korean agents using AI to trick western firms into hiring them, Microsoft says
Firm says AI tools are masking identities of false applicants, who then funnel wages from remote IT jobs to North KoreaFake IT workers deployed by North Korea are using AI technology, including voice-changing tools, to trick western companies into hiring them, Microsoft has said.The US tech firm said a signature Pyongyang money-raising ruse is being…
-
Microsoft Copilot to hijack your browser… for your own convenience
Embeds Edge into AI assistant, ignores questions about opt-in First seen on theregister.com Jump to article: www.theregister.com/2026/03/05/microsoft_adds_a_sidepane_for/
-
Microsoft spots ClickFix campaign getting users to self-pwn on Windows Terminal
Crooks tweak familiar copy-paste ruse so that victims run malicious commands themselves First seen on theregister.com Jump to article: www.theregister.com/2026/03/06/microsoft_spots_clickfix_campaign_abusing/
-
Microsoft 365 Backup to add file-level restore for faster recovery
Microsoft will soon begin rolling out a significant upgrade to Microsoft 365 Backup to speed up recovery by allowing administrators to restore individual files and folders. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/microsoft-365-backup-to-add-file-level-restore-for-faster-recovery/
-
Microsoft finally gets around to fixing Windows 10 Recovery Environment after breaking it in October
Released from the curse of the update bork fairy First seen on theregister.com Jump to article: www.theregister.com/2026/03/06/microsoft_finally_gets_around_to/
-
Europa im Visier von Cyber-Identitätsdieben
Deutsche Unternehmen müssen sich warm anziehen: Sowohl staatliche als auch ‘private” Akteure haben es auf sie abgesehen.ShutterstockWie die Experten von Darktrace in ihrem aktuellen Threat Report 2026 darstellen, bleiben Cloud- und E-Mail-Konten das Einfallstor Nummer Eins in Europa. Dem Bericht zufolge begannen im vergangenen Jahr in Europa 58 Prozent der Attacken mit kompromittierten Cloud-Accounts oder…
-
Bing AI promoted fake OpenClaw GitHub repo pushing info-stealing malware
Fake OpenClaw installers hosted in GitHub repositories and promoted by Microsoft Bing’s AI-enhanced search feature instructed users to run commands that deployed information stealers and proxy malware. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/bing-ai-promoted-fake-openclaw-github-repo-pushing-info-stealing-malware/
-
Breach Roundup: Patches and Hacks on Cisco Equipment
Also: Trojanized RedAlert App, Tycoon 2FA Takedown, CyberStrikeAI Attacks. This week, Cisco patches and hacks. Trojanized app targeted Israelis. Bye-bye, Tycoon 2FA. Also bye-bye LeakBase. A LexisNexis breach. Woman sentenced for trafficking Microsoft licenses. Silver Dragon targeted governments. Broadcom patch. A Mississippi medical clinic resumed operations. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/breach-roundup-patches-hacks-on-cisco-equipment-a-30927

