Security

LATEST

Hackers Targeting Unpatched Windows Systems with Proof-of-Concept Code for SMB Vulnerability

Last Update: Aug 23, 2023

Hackers are targeting unpatched Microsoft systems with publicly available SMBGhost PoC code.

View Article
Security hero image

Microsoft Patches Critical Azure Flaw Following Criticism for ‘Irresponsible’ Security Practices

Microsoft has fixed a critical vulnerability that could let hackers gain unauthorized access to sensitive data and cross-tenant applications managed by Azure AD. The fix comes shortly after security researchers criticized Microsoft for its “grossly irresponsible” cybersecurity practices. In a post on LinkedIn, Amit Yoran, the CEO of the security firm Tenable, called out Microsoft…

View Article
Microsoft Teams

Russian Hackers Used Microsoft Teams to Target Government Agencies

Microsoft has issued a security advisory about a new Russia-linked hacking group dubbed Midnight Blizzard. The threat actors used Microsoft Teams chat to launch social engineering campaigns (which started in late May) that affected dozens of organizations. According to the Microsoft threat intelligence team, the hackers (known as APT29) pretend to be technical support staff…

View Article
Cloud Computing and Security

Microsoft Defender for Storage to Add Malware Scanning Support in September

Microsoft has announced that the malware scanning capability will become generally available on September 1. The new agentless SaaS solution will be available as an add-on for Microsoft Defender for Storage customers and will cost $0.15 (USD)/GB of data scanned. Microsoft Defender for Storage is a security solution that identifies unusual attempts to access or…

View Article
Mobile security hero image

Microsoft and Samsung Unveil New Mobile Device Attestation Solution for Businesses

Microsoft has announced a new strategic partnership with Samsung to enhance mobile security for business customers. The companies have unveiled a new mobile hardware-backed device attestation solution that works seamlessly on company-owned and personal Samsung Galaxy devices. Device attestation is a security process used to verify the authenticity and integrity of a device before allowing…

View Article
Windows Logo

Microsoft Defender Vulnerability Management Gets Firmware Security Advisories

Microsoft announced yesterday that firmware security advisories are now available for the Microsoft Defender Vulnerability Management service. The new feature enables organizations to continuously monitor firmware security advisories based on information from vendors’ websites and inventories as well as third-party websites. Microsoft Defender Vulnerability Management is a service that allows customers to discover critical vulnerabilities…

View Article
Security

AMD ‘Zenbleed’ CPU Flaw Exposes Passwords and Encryption Keys to Hackers

Tavis Ormandy, a Google Security researcher has discovered a new vulnerability affecting AMD’s Zen 2 processors. Dubbed Zenbleed, the security flaw could let attackers steal passwords, cryptographic keys, and other sensitive information from software running on vulnerable machines. In a recent blog post, Ormandy detailed that the Zenbleed vulnerability (CVE-2023-20593) was first reported to AMD…

View Article
Security hero image

Report: Stolen Microsoft Key Gave Chinese Hackers Widespread Access to Cloud Services

Microsoft has recently disclosed a security breach that allowed Chinese hackers to access the email accounts of around two dozen organizations. Now, security researchers have found that the stolen security key provided access to far beyond Outlook and Exchange Online email accounts. According to Microsoft, the Chinese hacking group (dubbed Storm-0558) used forged authentication tokens…

View Article

Introduction to Windows Hello for Business

Last Update: Jul 24, 2023

Russell explains what Windows Hello for Business is and how it differs from Windows Hello for consumers.

View Article

How to Set Up Windows Hello for Business

Last Update: Jul 24, 2023

Learn how to set up Windows Hello for Business using Microsoft Intune.

View Article
Go to page