Tag: microsoft
-
>>Follina<< (CVE-2022-30190): Microsoft Support Diagnostic Tool 0-Day Vulnerability Being Actively Exploited
by
in SecurityNewsThis bulletin was written by Michal Nowakowski of the Kudelski Security Threat Detection & Research Team Summary On May 27th, 2022, threat researc… First seen on research.kudelskisecurity.com Jump to article: research.kudelskisecurity.com/2022/05/31/follina-cve-2022-30190-microsoft-support-diagnostic-tool-0-day-vulnerability-being-actively-exploited/
-
>>SynLapse<< Azure Synapse Pipeline and Data Factory Vulnerability (CVE-2022-29972)
by
in SecurityNewsThis bulletin was written by Eric Dodge of the Kudelski Security Threat Detection & Research Team Summary Microsoft has recently mitigated a vulne… First seen on research.kudelskisecurity.com Jump to article: research.kudelskisecurity.com/2022/06/15/synlapse-azure-synapse-pipeline-and-data-factory-vulnerability-cve-2022-29972/
-
SPNEGO NEGOEX: Critical Pre-Authentication RCE Vulnerability in Modern Microsoft Windows Operating Systems (CVE-2022-37958)
by
in SecurityNewsWritten by Mark Stueck of the Kudelski Security Threat Detection & Research Team Summary On Tuesday, December 13th, Microsoft reclassified a previ… First seen on research.kudelskisecurity.com Jump to article: research.kudelskisecurity.com/2022/12/14/advisory-spnego-negoex-critical-pre-authentication-rce-vulnerability-in-modern-microsoft-windows-operating-systems-cve-2022-37958/
-
CVE-2023-23397 Microsoft Outlook Privilege Elevation Critical Vulnerability
by
in SecurityNewsWritten by Lina Jiménez Becerra, Anton Jörgensson and Mark Stueck of the Kudelski Security Threat Detection & Research Team CVE-2023-23397: Abili… First seen on research.kudelskisecurity.com Jump to article: research.kudelskisecurity.com/2023/03/15/cve-2023-23397-microsoft-outlook-privilege-elevation-critical-vulnerability/
-
CVE-2023-36884 Office and Windows HTML Remote Code Execution Vulnerability
by
in SecurityNewsWritten by Yann Lehmann and Harish Segar of the Kudelski Security Threat Detection & Research Team Summary On July 11th, Microsoft disclosed a rem… First seen on research.kudelskisecurity.com Jump to article: research.kudelskisecurity.com/2023/07/14/cve-2023-36884-office-and-windows-html-remote-code-execution-vulnerability/
-
Escanor Malware delivered in Weaponized Microsoft Office Documents
by
in SecurityNewsFirst seen on resecurity.com Jump to article: www.resecurity.com/blog/article/escanor-malware-delivered-in-weaponized-microsoft-office-documents
-
Copilot: Administratorwissen zum Schutz der Daten
by
in SecurityNewsMicrosoft hat ja damit begonnen, seine AI-Lösung Copilot in Microsoft Office-Anwendungen mit “Auto-Opt-in” an Kunden mit entsprechender Lizenz auszurollen. Administratoren kommt eine besondere Verantwortung zu, was den Schutz von Daten im Unternehmen betrifft. Microsoft hat dazu kürzlich einen Beitrag mit … First seen on borncity.com Jump to article: www.borncity.com/blog/2024/12/01/copilot-was-administratoren-zum-schutz-der-daten-wissen-sollten/
-
RomCom nutzt Firefox und WindowsDay-Schwachstellen aus
by
in SecurityNewsESET Forscher finden bisher unbekannte Sicherheitslücke in Mozilla-Produkten und eine weitere Schwachstelle in Microsoft Windows, die in einem Zero-Click-Exploit kombiniert wurde First seen on welivesecurity.com Jump to article: www.welivesecurity.com/de/eset-research/romcom-nutzt-firefox-und-windows-zero-day-schwachstellen-aus/
-
CVE-2024-21388 Enables Silent Installation of Malicious Extensions
by
in SecurityNewsA recently patched security vulnerability in Microsoft Edge could have allowed malicious actors to stealthily install arbitrary extensions on users’ s… First seen on sensorstechforum.com Jump to article: sensorstechforum.com/cve-2024-21388-edge-flaw/
-
Microsoft Fights Global Outage Developments So Far
by
in SecurityNews
Tags: microsoftIn an unexpected and chaotic turn of events, a significant IT outage disrupted major institutions globally. Here’s the latest information: Microsoft A… First seen on sensorstechforum.com Jump to article: sensorstechforum.com/microsoft-global-outage/
-
CVE-2024-38193 Exploited by Lazarus Group in Targeted Attacks
by
in SecurityNewsA newly patched security vulnerability in Microsoft Windows has been actively exploited by the Lazarus Group, a notorious state-sponsored hacking grou… First seen on sensorstechforum.com Jump to article: sensorstechforum.com/cve-2024-38193-lazarus-group/
-
New Rockstar 2FA phishing service targets Microsoft 365 accounts
A new phishing-as-a-service (PhaaS) platform named ‘Rockstar 2FA’ has emerged, facilitating large-scale adversary-in-the-middle (AiTM) attacks to steal Microsoft 365 credentials. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-rockstar-2fa-phishing-service-targets-microsoft-365-accounts/
-
Phishing-as-a-Service Rockstar 2FA continues to be prevalent
by
in SecurityNews
Tags: 2fa, attack, authentication, credentials, malicious, mfa, microsoft, monitoring, phishing, service, threat, toolPhishing tool Rockstar 2FA targets Microsoft 365 credentials, it uses adversary-in-the-middle (AitM) attacks to bypass multi-factor authentication. Trustwave researchers are monitoring malicious activity associated with Phishing-as-a-Service (PaaS) platforms, their latest report focuses on a toolkit called Rockstar 2FA. Rockstar 2FA targets Microsoft 365 accounts and bypasses multi-factor authentication with adversary-in-the-middle (AitM) attacks. In AiTM phishing, threat…
-
Phishing-as-a-Service “Rockstar 2FA” Targets Microsoft 365 Users with AiTM Attacks
by
in SecurityNews
Tags: 2fa, attack, authentication, credentials, cybersecurity, email, malicious, mfa, microsoft, phishing, serviceCybersecurity researchers are warning about malicious email campaigns leveraging a phishing-as-a-service (PhaaS) toolkit called Rockstar 2FA with an aim to steal Microsoft 365 account credentials.”This campaign employs an AitM [adversary-in-the-middle] attack, allowing attackers to intercept user credentials and session cookies, which means that even users with multi-factor authentication (MFA) First seen on thehackernews.com Jump to…
-
Microsoft Fixes AI, Cloud, and ERP Security Flaws; One Exploited in Active Attacks
by
in SecurityNewsMicrosoft has addressed four security flaws impacting its artificial intelligence (AI), cloud, enterprise resource planning, and Partner Center offerings, including one that it said has been exploited in the wild.The vulnerability that has been tagged with an “Exploitation Detected” assessment is CVE-2024-49035 (CVSS score: 8.7), a privilege escalation flaw in partner.microsoft[.]com.”An First seen on thehackernews.com…
-
Nach Nothalt: Microsoft verteilt korrigierte Exchange-Server-Updates
by
in SecurityNewsDas Exchange-Update zum November-Patchday war fehlerhaft, Microsoft zog die Notbremse. Jetzt stehen korrigierte Sicherheitsupdates bereit. First seen on heise.de Jump to article: www.heise.de/news/Nach-Nothalt-Microsoft-verteilt-korrigierte-Exchange-Server-Updates-10181645.html
-
Golem Karrierewelt: Kostenloses Live-Webinar heute über Microsoft 365 Copilot
by
in SecurityNewsWas kann Copilot eigentlich, was ChatGPT nicht kann? Wer mehr darüber erfahren möchte, wie sich mit KI Effizienzgewinne realisieren lassen: Heute um 16:00 kostenloses Live-Webinar auf YouTube! First seen on golem.de Jump to article: www.golem.de/news/golem-karrierewelt-kostenloses-live-webinar-heute-ueber-microsoft-365-copilot-2411-190799.html
-
Microsoft Patches Multiple Vulnerabilities Allow Attackers to Elevate Privileges
by
in SecurityNewsMicrosoft has recently released patches addressing multiple vulnerabilities that could enable attackers to elevate privileges across various Microsoft products. The patches are part of Microsoft’s continuous efforts to enhance security and protect its users from threats. The Microsoft Security Response Center (MSRC) has been actively investigating these vulnerabilities to provide timely and effective security updates.…
-
Microsoft Exchange Server Nov. Updates Re-Release (27.11.2024)
by
in SecurityNewsMicrosoft hat zum 27. November die zurückgezogenen Sicherheitsupdates für Microsoft Exchange Server 2016- und 2019 erneut freigegeben. Beim ersten Release stellte sich heraus, dass die Transportregeln im Anschluss an die Update-Installation nicht mehr funktionieren. Nun glaubt Microsoft die Probleme behoben … First seen on borncity.com Jump to article: www.borncity.com/blog/2024/11/28/microsoft-exchange-server-nov-updates-re-release-27-11-2024/
-
Achtung: CoPilot in Office-Apps standardmäßig aktiviert
by
in SecurityNewsMicrosoft hat wohl Updates der Office-Apps in Microsoft 365 ausgerollt, bei denen standardmäßig ein Opt-In in CoPilot aktiviert ist. Damit werten Word oder Excel Dokumente standardmäßig aus, um die AI-Modelle zu trainieren. Nutzer tun gut daran, sofern möglich, diese Option … First seen on borncity.com Jump to article: www.borncity.com/blog/2024/11/28/achtung-copilot-in-office-apps-standardmaessig-aktiviert-abschalten/
-
Microsoft re-releases Exchange updates after fixing mail delivery
by
in SecurityNewsMicrosoft has re-released the November 2024 security updates for Exchange Server after pulling them earlier this month due to email delivery issues on servers using custom mail flow rules. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/microsoft-re-releases-exchange-updates-after-fixing-mail-delivery/
-
Microsoft launches $4M bug bounty challenge to secure AI, cloud
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/microsoft-launches-4m-bug-bounty-challenge-to-secure-ai-cloud
-
Russian APT RomCom combines Firefox and Windows zero-day flaws in drive-by exploit
by
in SecurityNews
Tags: access, antivirus, apt, attack, backdoor, browser, business, computer, cve, cybercrime, cyberespionage, defense, endpoint, exploit, flaw, germany, government, group, insurance, intelligence, malicious, microsoft, msp, password, powershell, russia, software, threat, ukraine, vulnerability, windows, zero-dayA Russia-aligned group that engages in both cybercrime and cyberespionage operations used a zero-click exploit chain last month that combined previously unknown and unpatched vulnerabilities in Firefox and Windows.The campaign, whose goal was to deploy the group’s RomCom backdoor on computers, targeted users from Europe and North America. The APT group, also known as Storm-0978,…
-
Microsoft says it’s not using your Word, Excel data for AI training
by
in SecurityNewsMicrosoft has denied claims that it uses Microsoft 365 apps (including Word, Excel, and PowerPoint) to collect data to train the company’s artificial intelligence (AI) models. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/microsoft-says-its-not-using-your-word-excel-data-for-ai-training/
-
Barings Law plans to sue Microsoft and Google over AI training data
by
in SecurityNewsMicrosoft and Google are using people’s personal data without proper consent to train artificial intelligence models, alleges Barings Law, as it prepares to launch a legal challenge against the tech giants First seen on Jump to article: /www.computerweekly.com/news/366616407/Barings-Law-plans-to-sue-Microsoft-and-Google-over-AI-training-data
-
Microsoft Finally Releases Recall as Part of Windows Insider Preview
by
in SecurityNewsThe preview version now includes multiple security-focused additions Microsoft had promised to include, such as SecureBoot, BitLocker, and Windows Hello. First seen on darkreading.com Jump to article: www.darkreading.com/endpoint-security/microsoft-releases-recall-windows-insider-preview
-
Microsoft patcht teils kritische Lücken außer der Reihe
by
in SecurityNewsMicrosoft hat Sicherheitslecks in mehreren Produkten geschlossen. Einige Updates müssen Nutzer installieren. First seen on heise.de Jump to article: www.heise.de/news/Microsoft-patcht-teils-kritische-Luecken-ausser-der-Reihe-10178400.html
-
Hackers Exploit Firefox and Windows Flaws: RomCom’s Advanced Attack Unveiled
by
in SecurityNewsA Russia-aligned hacking group, known as RomCom (also identified as Storm-0978, Tropical Scorpius, or UNC2596), has successfully exploited two zero-day vulnerabilities”, one in Mozilla Firefox and another in Microsoft Windows Task Scheduler. These vulnerabilities, identified as CVE-2024-9680 and CVE-2024-49039, were chained together to allow the group to execute arbitrary code and install malicious backdoors on…
-
AWS bends to Broadcom’s will with VMware Cloud Foundation asservice
Microsoft, Oracle, and IBM are all doing it. Andy Jassy’s rent-a-server shop may have felt it was leaving money on the table First seen on theregister.com Jump to article: www.theregister.com/2024/11/26/amazon_elastic_vmware_service_preview/
-
Nicht nur Microsoft kann das: Cloudflare verliert Logging-Daten seiner Kunden
by
in SecurityNews
Tags: microsoftMehrere Stunden an Protokolldaten eines Großteils der Cloudflare-Kundschaft sind verschwunden. Dabei wollte der Konzern nur eine kleine Änderung einführen. First seen on golem.de Jump to article: www.golem.de/news/nicht-nur-microsoft-kann-das-cloudflare-verliert-logging-daten-seiner-kunden-2411-191180.html