Articles tagged "Microsoft"

Found 70 articles

Ransomware-Linked ViperTunnel Malware Hits UK and US Businesses

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

ViperTunnel is a new backdoor malware linked to the DragonForce ransomware, specifically targeting businesses that operate on Windows servers in the US and the UK. This Python-based malware allows attackers to gain unauthorized access to systems, which can lead to data theft or further exploitation. Companies utilizing Windows server environments should be particularly vigilant, as the malware poses a significant risk to their operations and data security. The emergence of ViperTunnel highlights the ongoing challenges businesses face in protecting their networks from evolving ransomware threats. Organizations are urged to implement strong security measures and regularly update their systems to fend off such attacks.

Impact: Windows servers
Remediation: Organizations should implement strong security measures, regularly update their systems, and monitor for unusual activities.
Read Original

Recent allegations suggest that Microsoft is engaging in corporate espionage through its LinkedIn browser extension, raising concerns about user privacy. However, security researchers are analyzing these claims and have found mixed results regarding the extent of data collection by the extension. While some users are worried about their information being tracked or misused, the research indicates that the data collection practices may not be as invasive as initially claimed. This debate over LinkedIn's data handling practices is crucial as it could impact user trust and privacy standards across similar platforms. Understanding the reality behind these accusations is important for users who rely on LinkedIn for networking and job opportunities.

Impact: LinkedIn browser extension
Remediation: Users should review their privacy settings on LinkedIn and consider limiting permissions for the browser extension.
Read Original

A recently patched vulnerability in the EngageLab SDK, a third-party software development kit used in many Android applications, has potentially exposed the private data of around 50 million users, including 30 million cryptocurrency wallet holders. The flaw allowed apps on the same device to bypass Android's security measures, enabling unauthorized access to sensitive information. This incident raises significant concerns about the security of users' cryptocurrency assets, as the compromised data could have led to theft or fraud. Developers using the EngageLab SDK are urged to update their applications to protect users from potential attacks. The vulnerability was identified and addressed, but users should remain vigilant about app permissions and security practices.

Impact: EngageLab SDK used in various Android applications, particularly cryptocurrency wallets
Remediation: Developers should update their applications using the EngageLab SDK to the latest patched version as soon as possible.
Read Original

A new privilege escalation vulnerability, dubbed 'BlueHammer', has been identified in Windows operating systems. This flaw, which merges a time-of-check to time-of-use (TOCTOU) vulnerability with path confusion, allows attackers to gain higher-level access to systems. Users of affected Windows versions are particularly at risk, as this could enable unauthorized actions that compromise system security. The release of exploit code for BlueHammer raises concerns about its potential use in cyberattacks, making it crucial for organizations to address this vulnerability promptly. Keeping systems updated and applying any available patches will be essential to mitigate the risks associated with this flaw.

Impact: Windows operating systems with the BlueHammer vulnerability
Remediation: Users should apply the latest patches and updates from Microsoft to mitigate the vulnerability.
Read Original
Missile Alert Phishing Exploits Iran-US-Israel Conflict for Microsoft Logins

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

A new phishing scam is exploiting the ongoing conflict between Iran, the US, and Israel by sending out fake missile alerts to trick users into revealing their Microsoft login credentials. Attackers are using QR codes and counterfeit government emails to lure victims. This tactic is particularly concerning as it preys on the heightened anxiety surrounding geopolitical tensions, making users more susceptible to clicking on malicious links. The scam underscores the importance of vigilance regarding unsolicited communications, especially during times of crisis. Users are advised to verify the authenticity of any alerts before taking action, particularly those requesting sensitive information.

Impact: Microsoft accounts
Remediation: Users should be cautious with unsolicited emails and alerts, verify sources before clicking on links or scanning QR codes, and enable two-factor authentication on their accounts.
Read Original

Windows 11 users who attempted to install a problematic preview update released in March are encouraged to download a new out-of-band update that fixes installation errors. This recent update addresses issues that may have prevented users from successfully applying the earlier version. Affected users should check for the latest updates in their system settings to ensure they have the fix installed. This situation is important because installation errors can disrupt users' workflows and impact system stability. Keeping software up to date is crucial for security and performance.

Impact: Windows 11
Remediation: Users should download the new out-of-band update to fix installation errors from the March preview update.
Read Original

Microsoft is currently addressing an issue that affects some users of Classic Outlook trying to send emails through Outlook.com. The problem has been acknowledged as part of ongoing investigations into email delivery failures. While the company has not specified the exact number of users impacted, it is clear that those relying on Classic Outlook for their email communications are experiencing significant disruptions. This situation is important because it highlights the challenges users may face with legacy software in modern environments, potentially affecting business communications and personal messaging. Microsoft is working on a solution, but users should be aware of potential delays in their email delivery until the issue is resolved.

Impact: Classic Outlook users on Outlook.com
Remediation: Microsoft is investigating the issue and working on a solution; no specific patches or updates mentioned.
Read Original

Microsoft has withdrawn the KB5079391 update for Windows 11 after users reported installation issues resulting in error code 0x80073712. This non-security preview update was intended to enhance the operating system but instead caused problems for those attempting to install it. The company is now investigating the source of the error, which is affecting users who downloaded this particular update. For many, this means they may have to wait longer for fixes or improvements that were supposed to come with the update. It's a reminder of the potential complications that can arise from software updates and the importance of monitoring system changes closely.

Impact: Windows 11, KB5079391 update
Remediation: Microsoft has pulled the KB5079391 update and is investigating the issue.
Read Original

A pro-Ukrainian hacking group known as Bearlyfy has carried out over 70 cyber attacks against Russian companies since January 2025. Their recent campaigns have utilized a custom ransomware known as GenieLocker, which targets Windows systems. This group aims to disrupt operations in Russian businesses, indicating a strategic move in the ongoing conflict between Ukraine and Russia. The use of ransomware adds a financial pressure point, potentially crippling affected organizations. As these attacks continue, it raises concerns about the security of critical infrastructure and business operations in the region.

Impact: Russian companies, Windows systems, GenieLocker ransomware
Remediation: N/A
Read Original
FBI Warns of Iran’s Handala Hack Group Using Fake Apps to Spy on Windows Users

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

The FBI has issued a warning about the Handala Hack Group, which has ties to Iran and is targeting Windows users by distributing fake versions of popular messaging apps, WhatsApp and Telegram. These counterfeit applications are designed to spy on users and potentially steal sensitive information. The attackers are using social engineering tactics to trick individuals into downloading the malicious software, which can lead to significant privacy breaches. This situation is particularly concerning as it underscores the risks associated with downloading apps from unofficial sources. Users are advised to only download applications from trusted sources and to remain vigilant about the permissions they grant to software.

Impact: Windows operating systems, WhatsApp, Telegram
Remediation: Users should only download applications from official sources and review app permissions carefully.
Read Original

Last week, security researchers discovered that ScreenConnect servers were vulnerable to attacks due to misconfigurations, potentially allowing unauthorized access to sensitive data. Additionally, a flaw in Microsoft SharePoint was exploited, putting numerous organizations at risk. This vulnerability could allow attackers to execute malicious code or gain access to restricted information. Both incidents emphasize the need for companies to regularly review their security settings and update their systems to protect against these types of vulnerabilities. With many businesses relying on these platforms, the implications of these security issues could be significant, affecting operational integrity and data confidentiality.

Impact: ScreenConnect, Microsoft SharePoint
Remediation: Organizations are advised to review and update their security configurations for ScreenConnect and apply any available patches for Microsoft SharePoint to mitigate these vulnerabilities.
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) is advising U.S. organizations to take immediate steps to secure their Microsoft Intune systems. This warning comes after a cyberattack targeted Stryker, a major medical technology company, exploiting vulnerabilities in the Intune endpoint management tool. The breach led to significant disruptions in Stryker's operations, raising concerns about the security of similar systems across various organizations. CISA recommends that users follow Microsoft's security guidance to bolster their defenses against potential attacks. This incident highlights the need for vigilance in managing endpoint systems, particularly in sectors that handle sensitive data.

Impact: Microsoft Intune, Stryker systems
Remediation: Organizations should follow Microsoft guidance to strengthen Intune configurations.
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about active exploitation of a recently patched vulnerability in SharePoint, identified as CVE-2026-20963. This remote code execution flaw allows attackers to run malicious code on affected systems, posing a significant risk to organizations using the software. Microsoft released a patch for this vulnerability back in January, but the discovery of in-the-wild exploitation suggests that some users may not have applied the update. Organizations using SharePoint should prioritize implementing the latest security updates to protect against potential breaches. Failing to address this vulnerability could lead to unauthorized access and data compromise, making it crucial for companies to stay vigilant and proactive in their cybersecurity practices.

Impact: SharePoint, affected versions unspecified.
Remediation: Organizations should apply the Microsoft patch released in January 2026 for CVE-2026-20963 to mitigate the risk of exploitation.
Read Original

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has alerted government agencies about two significant security vulnerabilities affecting the Synacor Zimbra Collaboration Suite (ZCS) and Microsoft Office SharePoint. Both flaws, identified as CVE-2025-66376 and another not specified in the article, have been found to be actively exploited by attackers. The CVE-2025-66376 vulnerability has a CVSS score of 7.2, indicating a moderate to high risk. Organizations using these platforms are urged to apply the necessary patches to protect against potential attacks. The exploitation of these vulnerabilities underscores the need for timely updates and vigilance in cybersecurity practices, especially for government entities.

Impact: Synacor Zimbra Collaboration Suite (ZCS), Microsoft Office SharePoint
Remediation: Government agencies are advised to apply patches for the vulnerabilities in Zimbra and SharePoint as soon as possible. Specific patch numbers or versions were not mentioned in the article.
Read Original

As ransomware payments decline to historic lows, attackers are changing their tactics to adapt to the shrinking market. Research indicates that many ransomware actors are moving away from using sophisticated tools like Cobalt Strike and are instead relying on native Windows tools to carry out their attacks. This shift comes as the frequency of data theft incidents is increasing, suggesting that attackers are looking for ways to maintain their profitability despite the challenges. The implications of this trend are concerning for organizations, as it may lead to more widespread and varied attacks that are harder to detect and defend against. Companies need to stay vigilant and adapt their security measures to counter these evolving threats.

Impact: Cobalt Strike, native Windows tools
Remediation: Organizations should enhance their security protocols, monitor for unusual activity, and consider training staff on recognizing potential threats.
Read Original
Page 1 of 5Next