Tag Microsoft

Who’s Overseeing the Machines? The Unowned Identity Crisis

Identity & Access Management, Security Operations Machine Identities Surpass Human Ones, Yet Accountability Remains Inadequate Rashmi Ramesh (rashmiramesh_) • September 29, 2025 Image: Shutterstock The rapidly growing segment of users within enterprises often goes unnoticed in human resources systems. This group primarily operates through service accounts, API keys, bots, and…

Read MoreWho’s Overseeing the Machines? The Unowned Identity Crisis

Microsoft Neutralizes Iran-Based Lebanese Hackers Targeting Israeli Firms

Microsoft recently announced that it has taken action to mitigate harmful activities linked to a previously unidentified hacker group known as Polonium. This group has been exploiting OneDrive for malicious purposes, prompting Microsoft to intervene. In addition to terminating the accounts connected to this Lebanon-based group, the Microsoft Threat Intelligence…

Read MoreMicrosoft Neutralizes Iran-Based Lebanese Hackers Targeting Israeli Firms

An App Designed to Dox Critics of Charlie Kirk Ended Up Doxing Its Own Users Instead

Recent findings reveal that the US Department of Homeland Security (DHS) has amassed DNA data from nearly 2,000 American citizens in recent years. This accumulation raises significant concerns regarding legal implications and the level of oversight involved, especially since the collected genetic material has been entered into an FBI crime…

Read MoreAn App Designed to Dox Critics of Charlie Kirk Ended Up Doxing Its Own Users Instead

Microsoft Addresses Actively Exploited Privilege Escalation Vulnerability in Power Pages

Microsoft Addresses Critical Vulnerabilities in Bing and Power Pages Microsoft has issued security updates to resolve two critical vulnerabilities affecting its Bing search engine and Power Pages platform, one of which is currently being actively exploited. The release highlights ongoing concerns in the cybersecurity landscape as attackers increasingly target widely…

Read MoreMicrosoft Addresses Actively Exploited Privilege Escalation Vulnerability in Power Pages

Hackers Concealed Malware Using Complex AI Code

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development Attackers Conceal Malware Within Vector Image Rashmi Ramesh (rashmiramesh_) • September 24, 2025 Image: Shutterstock Recent findings indicate that hackers have utilized artificial intelligence-generated code to embed malware in a sophisticated phishing campaign, according to insights from Microsoft. This malware…

Read MoreHackers Concealed Malware Using Complex AI Code

Feds Link ‘Scattered Spider’ Pair to $115 Million in Ransom Payments – Krebs on Security

In a significant legal development, U.S. prosecutors recently filed criminal charges against Thalha Jubair, a 19-year-old from the U.K., in connection with his alleged involvement as a central figure in Scattered Spider, a notorious cybercrime organization implicated in extortion schemes totaling over $115 million. These accusations, which emerged as Jubair…

Read MoreFeds Link ‘Scattered Spider’ Pair to $115 Million in Ransom Payments – Krebs on Security

2,500+ Variants of Truesight.sys Driver Exploited for EDR Bypass and HiddenGh0st RAT Deployment

A significant malware campaign has been uncovered that exploits a vulnerable driver from Adlice’s software suite to circumvent security measures and deploy the Gh0st RAT malware. This revelation underscores the persistent risks that come from legacy systems and their components. The cybersecurity firm Check Point detailed a strategic approach taken…

Read More2,500+ Variants of Truesight.sys Driver Exploited for EDR Bypass and HiddenGh0st RAT Deployment

CERT-UA Alerts of UAC-0173 Attacks Targeting Ukrainian Notaries with DCRat Deployment

The Computer Emergency Response Team of Ukraine (CERT-UA) has issued an alert concerning a resurgence in cyber activity from the organized criminal group known as UAC-0173. This group is reportedly employing a remote access trojan called DCRat (also referred to as DarkCrystal RAT) to infiltrate systems. This recent campaign, which…

Read MoreCERT-UA Alerts of UAC-0173 Attacks Targeting Ukrainian Notaries with DCRat Deployment