Tag: microsoft
-
Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets
Microsoft on Monday warned of phishing campaigns that employ phishing emails and OAuth URL redirection mechanisms to bypass conventional phishing defenses implemented in email and browsers.The activity, the company said, targets government and public-sector organizations with the end goal of redirecting victims to attacker-controlled infrastructure without stealing their tokens. It described First seen on thehackernews.com…
-
KI-Anwendungsfälle mit Microsoft Copilot – Microsoft AI Tour: Souveränität as a Service und Use Cases
First seen on security-insider.de Jump to article: www.security-insider.de/microsoft-ai-tour-souveraenitaet-as-a-4603d005e59798ec95a6dd881cedca59/
-
Hackerbot-Claw Bot Exploits GitHub Actions CI/CD Flaw to Attack Microsoft and DataDog
Tags: ai, attack, automation, cyber, exploit, flaw, github, microsoft, open-source, remote-code-executionHackerbot-claw, an autonomous AI bot, has launched a week-long campaign abusing GitHub Actions misconfigurations to hit CI/CD pipelines at Microsoft, DataDog, and other major open-source projects, achieving remote code execution (RCE) and even full repo compromise in some cases. The attacks highlight how unsafe pull_request_target workflows and shell interpolation bugs can turn routine automation into…
-
Phish of the day: Microsoft OAuth scams abuse redirects for malware delivery
Crims hope for payday from malicious payloads rather than stealing access tokens First seen on theregister.com Jump to article: www.theregister.com/2026/03/03/microsoft_oauth_scams/
-
Phish of the day: Microsoft OAuth scams abuse redirects for malware delivery
Crims hope for payday from malicious payloads rather than stealing access tokens First seen on theregister.com Jump to article: www.theregister.com/2026/03/03/microsoft_oauth_scams/
-
When Trusted Authentication Enables Privilege Escalation
Active Directory remains the backbone of enterprise identity. Despite years of modernization efforts, many organizations still rely on legacy authentication protocols that were never designed for today’s threat landscape. New reporting from Dark Reading highlights how attackers continue to abuse NTLM and Kerberos within Microsoft Active Directory environments to escalate privileges, move laterally, and maintain…
-
Florida woman imprisoned for massive Microsoft license fraud scheme
A Florida woman was sentenced to 22 months in prison for running a massive years-long scheme to traffic thousands of stolen Microsoft Certificate of Authenticity (COA) labels. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/florida-woman-imprisoned-for-massive-microsoft-license-fraud-scheme/
-
Russia-linked APT28 exploited MSHTML zero-day CVE-2026-21513 before patch
Russia-linked APT28 reportedly exploited MSHTML zero-day CVE-2026-21513 before Microsoft patched it, a high-severity bypass flaw. Akamai reports that Russia-linked APT28 may have exploited CVE-2026-21513 CVSS score of 8.8), a high-severity MSHTML vulnerability (CVSS 8.8), before Microsoft patched it in February 2026. The vulnerability is an Internet Explorer security control bypass that can lead to code…
-
MSHTML Zero-Day in Windows Exploited by APT28 Prior to Feb 2026 Security Update
Microsoft released its Patch Tuesday updates, addressing 59 vulnerabilities, including a critical zero-day flaw in the Windows MSHTML framework. Tracked as CVE-2026-21513, this actively exploited vulnerability allows attackers to bypass security features and execute arbitrary code. APT28 is a well-documented advanced persistent threat group known for sophisticated malware campaigns. Security researchers from Akamai discovered that…
-
How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer
The technology giant and third-party security vendors are plotting an ambitious overhaul of how their products interoperate. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/microsoft-windows-resilience-initiative-security-kernel/813416/
-
MetaCompliance führt innovative ExposureFunktion ein
MetaCompliance ist die Plattform, die Daten zu Sicherheitsverletzungen von Drittanbietern direkt mit automatisierten, gezielten Schulungsmaßnahmen verknüpft. Die nahtlose Integration mit Microsoft Power BI und Slack sowie die ausgereiften Deepfake-Simulationen sorgen dafür, dass Insights und Maßnahmen direkt in den Arbeitsalltag einfließen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/metacompliance-fuehrt-innovative-exposure-monitoring-funktion-ein/a43910/
-
MetaCompliance führt innovative ExposureFunktion ein
MetaCompliance ist die Plattform, die Daten zu Sicherheitsverletzungen von Drittanbietern direkt mit automatisierten, gezielten Schulungsmaßnahmen verknüpft. Die nahtlose Integration mit Microsoft Power BI und Slack sowie die ausgereiften Deepfake-Simulationen sorgen dafür, dass Insights und Maßnahmen direkt in den Arbeitsalltag einfließen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/metacompliance-fuehrt-innovative-exposure-monitoring-funktion-ein/a43910/
-
MetaCompliance führt innovative ExposureFunktion ein
MetaCompliance ist die Plattform, die Daten zu Sicherheitsverletzungen von Drittanbietern direkt mit automatisierten, gezielten Schulungsmaßnahmen verknüpft. Die nahtlose Integration mit Microsoft Power BI und Slack sowie die ausgereiften Deepfake-Simulationen sorgen dafür, dass Insights und Maßnahmen direkt in den Arbeitsalltag einfließen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/metacompliance-fuehrt-innovative-exposure-monitoring-funktion-ein/a43910/
-
Digitale Souveränität, resiliente Cloud und KI aus Europa – Microsoft eröffnet erstes Studio für souveräne Cloud- und KI-Architekturen
First seen on security-insider.de Jump to article: www.security-insider.de/microsoft-eroeffnet-erstes-studio-fuer-souveraene-cloud-und-ki-architekturen-a-730da0134637b74513cbe6dd6030ff60/
-
Microsoft to auto-launch Copilot in Edge whenever you click a link from Outlook
Tags: microsoftWhac-A-Mole season continues as Redmond finds yet another corner to stuff its 21st century Clippy First seen on theregister.com Jump to article: www.theregister.com/2026/02/26/copilot_pane_edge_outlook/
-
Microsoft warns of RAT delivered through trojanized gaming utilities
Attackers spread trojanized gaming tools to deliver a stealthy RAT using PowerShell, LOLBins, and Defender evasion tactics. Threat actors are tricking users into running trojanized gaming utilities shared through browsers and chat platforms to deploy a remote access trojan. >>Microsoft Defender researchers uncovered a campaign that lured users into running trojanized gaming utilities (Xeno.exe or…
-
Microsoft testing Windows 11 batch file security improvements
Microsoft is rolling out new Windows 11 Insider Preview builds that improve security and performance during batch file or CMD script execution. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/microsoft-testing-windows-11-batch-file-security-improvements/
-
Microsoft boss on AI content: ‘Nobody wants anything that is sloppy’
Sometimes the ‘S’ word slips through even the best media training First seen on theregister.com Jump to article: www.theregister.com/2026/02/25/microsoft_boss_on_ai_content/
-
Microsoft taps ASUS and Dell for the Windows 365 Cloud PC strategy
Microsoft is adding two new Windows 365 Cloud PC devices, the ASUS NUC 16 for Windows 365 and the Dell Pro Desktop for Windows 365, expanding hardware options for its … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/27/windows-365-cloud-pc-devices-asus-and-dell/
-
Microsoft taps ASUS and Dell into the Windows 365 Cloud PC strategy
Microsoft is adding two new Windows 365 Cloud PC devices, the ASUS NUC 16 for Windows 365 and the Dell Pro Desktop for Windows 365, expanding hardware options for its … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/27/windows-365-cloud-pc-devices-asus-and-dell/
-
Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms
Threat actors are luring unsuspecting users into running trojanized gaming utilities that are distributed via browsers and chat platforms to distribute a remote access trojan (RAT).”A malicious downloader staged a portable Java runtime and executed a malicious Java archive (JAR) file named jd-gui.jar,” the Microsoft Threat Intelligence team said in a post on X. “This…
-
Microsoft Defender Enhances Security with URL Click Alerts for Microsoft Teams
Microsoft is expanding its threat detection capabilities by extending Microsoft Defender for Office 365 (MDO) URL click alerting into Microsoft Teams. This critical update allows security teams to detect, investigate, and respond to potentially malicious link clicks within Teams messages, expanding threat monitoring beyond traditional email vectors. By surfacing these alerts, organizations can identify threats…
-
Microsoft Defender Discovers Trojanized Gaming Utility Campaign Stealing Data with RATs
Microsoft Defender researchers have uncovered a new campaign that abuses trojanized gaming utilities to deliver multi”‘stage malware with remote access, data theft, and payload delivery capabilities. Attackers are masquerading as popular tools such as Xeno.exe and RobloxPlayerBeta.exe, tricking gamers into launching the malicious chain via downloads shared through web browsers and chat platforms. Once a…
-
Breach Roundup: Finnish Hacker Sentenced to Nearly 7 Years
Also, More ShinyHunters Breaches, North Korea Laptop Farm Operator Sentenced. This week, Finland’s Aleksanteri Kivimäki sentenced. ShinyHunters breaches. Laptop farm rancher sentenced. Oregon state agency hacker sentenced. African scammers arrested. MuddyWater AI-assisted hacks. Advantest ransomware incident, SolarWinds and Microsoft patches. FileZen flaw. QualDerm breach. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/breach-roundup-finnish-hacker-sentenced-to-nearly-7-years-a-30863
-
Microsoft Copilot DLP Bypass: A Data Trust Wake-Up Call for AI Security
Tags: access, ai, business, ciso, cloud, compliance, control, data, data-breach, detection, email, endpoint, infrastructure, leak, microsoft, monitoring, risk, risk-management, saas, toolWhen Microsoft confirmed that a bug allowed Copilot to surface and summarize emails marked confidential despite existing DLP controls, it reignited urgent questions about Microsoft Copilot security, DLP bypass risk and enterprise AI data protection. The reaction was immediate. For many CISOs and security leaders responsible for Microsoft 365 security and AI risk management, it…
-
Accelerate Secure Releases With Microsoft Copilot and Sonatype Guide
<div cla AI coding assistants, such as Microsoft Copilot, are fundamentally transforming the process of software development. Developers can generate scaffolding, draft functions, update dependencies, and even build full applications in seconds. The speed is real, and so is the productivity boost. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/accelerate-secure-releases-with-microsoft-copilot-and-sonatype-guide/
-
Accelerate Secure Releases With Microsoft Copilot and Sonatype Guide
<div cla AI coding assistants, such as Microsoft Copilot, are fundamentally transforming the process of software development. Developers can generate scaffolding, draft functions, update dependencies, and even build full applications in seconds. The speed is real, and so is the productivity boost. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/accelerate-secure-releases-with-microsoft-copilot-and-sonatype-guide/

