Security News

Microsoft Defender ATP now warns of jailbroken iPhones, iPads
2021-06-15 20:21

Microsoft has added support for detecting jailbroken iOS devices to Microsoft Defender for Endpoint, the enterprise version of its Windows 10 Defender antivirus. The new detection capability now available in the enterprise endpoint security platform will warn security teams of both managed and unmanaged jailbroken iPhones and iPads on their network.

Windows 11 Leaked - What we know so far about Microsoft's new OS
2021-06-15 17:59

An alleged preview build for Windows 11 has been leaked, confirming the new name for Microsoft's next generation of Windows and providing a glimpse of the new features. At first glance, Windows 11 looks a lot like Windows 10 with a design overhaul that includes colorful icons, rounded corners, and new animations.

Microsoft Disrupts Large-Scale, Cloud-Based BEC Campaign
2021-06-15 16:46

Threat hunters at Microsoft recently uncovered and disrupted infrastructure that powered a large-scale business email compromise campaign. "The emails originated from an external cloud provider's address space."

Microsoft product vulnerabilities reached a new high of 1,268 in 2020
2021-06-15 13:31

56% of all Microsoft critical vulnerabilities could have been mitigated by removing admin rights, according to the 2021 BeyondTrust Microsoft Vulnerabilities Report. The total number of vulnerabilities in Microsoft products reached an all-time high of 1,268 in 2020, a 48% increase year over year, according to a new report.

Microsoft Gets Second Shot at Banning hiQ from Scraping LinkedIn User Data
2021-06-15 12:39

The U.S. Supreme Court has granted LinkedIn another legal option to try to prevent rival hiQ Labs from scraping public information from its user profiles, something the Microsoft-owned professional networking platform has claimed is a violation of user privacy and a misuse of its data. The decision effectively vacates a 2019 ruling by the San Francisco-based U.S. 9th Circuit Court of Appeals barring LinkedIn from prohibiting hiQ access to publicly available information of LinkedIn's users, bouncing the case back to the lower court to hear again.

Microsoft confirms Windows taskbar button blurry text issue
2021-06-15 10:26

Microsoft has confirmed a known issue causing the text on the "News and Interests" Windows Taskbar to get blurry after installing recent Windows 10 updates. "After installing KB5001391 or later updates, the news and interests button in the Windows taskbar might have blurry text on certain display configurations," Microsoft said.

Microsoft Teams: Very Bad Tabs Could Have Led to BEC
2021-06-14 20:26

Such attacks could be carried out via a malicious Microsoft Teams tab and Power Automate flows, Grant explained. Ca organization - can create a malicious Teams tab and use it to "Eventually steal emails, Teams messages and files from gooduser(at)fakecorp.ca, and send emails and messages on their behalf."

Microsoft: Scammers bypass Office 365 MFA in BEC attacks
2021-06-14 17:26

Microsoft 365 Defender researchers have disrupted the cloud-based infrastructure used by scammers behind a recent large-scale business email compromise campaign. "The use of attacker infrastructure hosted in multiple web services allowed the attackers to operate stealthily, characteristic of BEC campaigns," Microsoft 365 Defender Research Team's Stefan Sellmer and Microsoft Threat Intelligence Center security researcher Nick Carr explained.

Microsoft: SEO poisoning used to backdoor targets with malware
2021-06-14 16:30

Microsoft is tracking a series of attacks that use SEO poisoning to infect targets with a remote access trojan capable of stealing the victims' sensitive info and backdooring their systems. The malware delivered in this campaign is SolarMarker, a.NET RAT that runs in memory and is used by attackers to drop other payloads on infected devices.

Microsoft Disrupts Large-Scale BEC Campaign
2021-06-14 16:03

Microsoft today announced it disrupted a large-scale business email compromise campaign in which the attackers used forwarding rules to access messages related to financial transactions. The attackers used a large cloud-based infrastructure for the campaign, to automate operations at scale, including the monitoring of compromised mailboxes, the creation of forwarding rules, identifying valuable victims, and processing the forwarded emails.