Saturday, May 17, 2025

Microsoft

Hackers Leveraging PowerShell to Bypass Antivirus and EDR Defenses

Cybersecurity researchers have uncovered a growing trend in which threat actors are exploiting Microsoft PowerShell a legitimate Windows command-line interface to bypass advanced antivirus and Endpoint Detection and Response...

Proofpoint Buys Hornetsecurity, A Microsoft 365 Security Specialist For $1 Billion

Cybersecurity giant Proofpoint has announced its agreement to acquire Hornetsecurity Group, a leading European provider of AI-powered Microsoft 365 security solutions. The deal, reportedly...

Critical BitLocker Flaw Exploited in Minutes: Bitpixie Vulnerability Proof of Concept Unveiled

Security researchers have demonstrated a non-invasive method to bypass Microsoft BitLocker encryption on Windows devices in just five minutes without physically modifying the hardware....

Critical Microsoft Outlook Flaw Enables Remote Execution of Arbitrary Code

Newly disclosed vulnerability in Microsoft Outlook (CVE-2025-32705) permits attackers to execute arbitrary code on compromised systems through a memory corruption flaw. Rated 7.8 (CVSS...

Microsoft Defender Vulnerability Allows Unauthorized Privilege Gain

Newly disclosed vulnerability in Microsoft Defender for Endpoint (CVE-2025-26684) exposes systems to local privilege escalation attacks by exploiting improper handling of file paths. Rated...

Microsoft Alerts on AD CS Flaw Enabling Remote Denial-of-Service Attacks

Microsoft has issued a security advisory for a newly identified vulnerability in Active Directory Certificate Services (AD CS), tracked as CVE-2025-29968, which could allow...

New Microsoft Scripting Engine Vulnerability Exposes Systems to Remote Code Attacks

Critical zero-day vulnerability in Microsoft’s Scripting Engine (CVE-2025-30397) has been confirmed to enable remote code execution (RCE) attacks over networks, raising urgent concerns for...

Critical Microsoft Office Vulnerabilities Enable Malicious Code Execution

Microsoft has addressed three critical security flaws in its Office suite, including two vulnerabilities rated Critical and one Important, all enabling remote code execution...

Hackers Exploit Legacy Protocols in Microsoft Entra ID to Bypass MFA and Conditional Access

A sophisticated and highly coordinated cyberattack campaign came to light, as tracked by Guardz Research. This operation zeroed in on legacy authentication protocols within...

Microsoft Teams to Safeguard Meetings by Blocking Screen Snaps

Microsoft has announced the upcoming release of a groundbreaking "Prevent Screen Capture" feature for Teams, designed to block unauthorized screenshots and recordings during virtual...

New Exploit Method Extracts Microsoft Entra Tokens Through Beacon

A novel exploit method leveraging Beacon Object Files (BOFs) has emerged, enabling attackers to extract Microsoft Entra (formerly Azure AD) tokens from compromised endpoints,...