Tag Microsoft

Android RAT Camouflaged by Hugging Face

Cybercrime, Fraud Management & Cybercrime, Incident & Breach Response SmarterMail Vulnerability, Nike Data Breach Investigation, Empire Market Co-Creator Pleads Guilty Pooja Tikekar (@PoojaTikekar) • January 29, 2026 Image: Shutterstock/ISMG This week’s cybersecurity roundup covers research identifying an Android remote access Trojan (RAT) that utilizes Hugging Face’s infrastructure, alongside revelations regarding…

Read MoreAndroid RAT Camouflaged by Hugging Face

Microsoft Issues Updates to Address Critical Vulnerabilities in Windows and Other Software

Microsoft has recently released critical security updates aimed at addressing significant vulnerabilities in its Windows operating system and associated software. This rollout is part of the scheduled Patch Tuesday updates for June 2023. The update addresses a total of 73 vulnerabilities, categorized by severity as follows: six are marked as…

Read MoreMicrosoft Issues Updates to Address Critical Vulnerabilities in Windows and Other Software

Hackers Discover New Method to Bypass Microsoft Office 365 Safe Links

Recent findings from security researchers indicate that some hacking groups have discovered a method to circumvent a critical security feature within Microsoft Office 365, aimed at safeguarding users from phishing and malware threats. Known as Safe Links, this feature is bundled with Microsoft’s Advanced Threat Protection (ATP) and operates by…

Read MoreHackers Discover New Method to Bypass Microsoft Office 365 Safe Links

Microsoft Addresses Two Actively Exploited Zero-Day Vulnerabilities

As businesses brace for vulnerabilities in their systems, Microsoft has announced the release of critical security patches during the May 2018 Patch Tuesday. This update addresses a staggering 67 security vulnerabilities, including two zero-day exploits under active attack by cybercriminals, a situation that demands immediate attention from organizations across various…

Read MoreMicrosoft Addresses Two Actively Exploited Zero-Day Vulnerabilities

Surge of Scam Spam Originating from an Authentic Microsoft Address

Recent reports indicate that emails originating from a legitimate Microsoft address—which the company recommends customers add to their allow lists—are being utilized to distribute scam content. The emails are sent from [email protected], an address associated with Power BI. This platform provides analytics and business intelligence, integrating insights from various sources…

Read MoreSurge of Scam Spam Originating from an Authentic Microsoft Address

Why is Microsoft Redirecting example.com Traffic to a Company in Japan?

Microsoft Network Anomaly Redirects Traffic Intended for Testing Domain In an unusual incident reported by Microsoft, an unexplained network anomaly inadvertently redirected traffic meant for the testing domain example.com to a Japanese electronics cable manufacturer, Sumitomo Electric. The example.com domain, outlined under RFC2606, is designated solely for illustrative and testing…

Read MoreWhy is Microsoft Redirecting example.com Traffic to a Company in Japan?

Real-Time Phishing Kits Now Targeting Okta, Microsoft, and Google

Cybersecurity experts are currently grappling with a surge of voice-phishing attacks aimed at single sign-on (SSO) tools. These coordinated efforts have led to instances of data theft and extortion, as various cybercrime groups, including one claiming ties to ShinyHunters, harness sophisticated voice calls and phishing kits to deceive victims into…

Read MoreReal-Time Phishing Kits Now Targeting Okta, Microsoft, and Google