A savvy phishing campaign manages to evade native Microsoft security defenses, looking to steal O365 credentials. A phishing campaign bent on stealing Microsoft login credentials is...
The modern IT organization has a wide variety of responsibilities and competing priorities. As a result, cybersecurity is often overlooked in favor of projects that have an immediate...
Several purported security flaws in Skype have been disclosed publicly, but Microsoft claims they do not need “immediate security servicing”. On February 2, researcher “mr.d0x,” also...
Windows 7 is still susceptible to blind TCP/IP hijacking attacks via a vulnerability that a security researcher says he reported to Microsoft eight years ago. Adam Zabrocki (AKA ‘pi3’)...
The recent attack on SolarWinds has highlighted how dangerous supply chain threats can be. However, besides this mega-breach, there have been several other notable attacks that have occurred...
The vast majority of the most popular Windows-native PDF viewers were vulnerable to multiple attack techniques exploiting standard PDF features, a team of security researchers has discovered. Several...
Zero-day vulnerabilities are one of the preferred attack techniques used by several attackers, and such attacks are increasing again. Threat actors are actively abusing new zero-day...
A bug in Windows 10 causes the operating system to crash with a Blue Screen of Death simply by opening a certain path in a browser’s...
Microsoft has addressed companies who have not yet updated their systems to address the critical Zerologon flaw, a vulnerability in the cryptography of Microsoft’s Netlogon process that allows...
Starting Feb. 9, Microsoft will enable Domain Controller “enforcement mode” by default to address CVE-2020-1472. Microsoft is taking matters into its own hands when it comes...
Recent Comments