Microsoft Seizes 240 Domains Used By phishing-As-A-Service (PhaaS) Platform
The Digital Crimes Unit (DCU) of Microsoft has taken down 240 fraudulent websites that were utilized by the Egyptian phishing-as-a-service operation "ONNX."
Abanoub Nady, also known online as "MRxC0DER," created and marketed "do it yourself"...
EvilProxy Attacking Microsoft 365 Users Abusing Open Redirection With Indeed.com
A recent phishing campaign, identified by Menlo Labs, has been actively targeting executives in senior roles across multiple industries, with a primary focus on Banking and Financial Services, Insurance providers, Property Management and Real...
Microsoft Extends Multi-Billion Dollar AI Partnership With OpenAI Till 2030
Microsoft and OpenAI have announced an extension and evolution of their strategic partnership, reinforcing their commitment to advancing artificial intelligence technology. The announcement via Microsoft's Corporate Blog outlines key aspects of their continued collaboration through 2030.
The...
Microsoft Defender Bounty Program: Rewards up to $20,000 USD
Microsoft has launched the Defender Bounty Program, which aims to improve the security of its customers' experience by incentivizing researchers with rewards of up to USD 20,000.
Through this program, Microsoft encourages researchers to...
Njrat Attacking Users Abusing Microsoft Dev Tunnels for C2 Communications
Security researchers have uncovered a new campaign leveraging the Njrat remote access trojan (RAT) to abuse Microsoft’s developer-oriented Dev Tunnels service for covert command-and-control (C2) communications.
Historically associated with credential theft and USB-based propagation, the...
Hackers Leveraging Azure App Proxy Pre-authentication to Access Orgs Private Network Resources
Recent security findings reveal that threat actors are actively exploiting misconfigured Azure application proxies to gain unauthorized access to organizations' internal resources.
When Azure app proxy pre-authentication is set to "Passthrough" instead of the default...
Specula Tool Leveraging Registry to Turn Outlook Into a C2 Server
Specula tool utilizes a Registry to turn Microsoft Outlook Into a C2 Server capable of executing arbitrary commands.
Fundamentally, Specula is a C2 framework that uses the Outlook home page feature. It exposes the ability...
Microsoft WinDbg RCE Vulnerability Let Attackers Execute Arbitrary Code Remotely
A high-severity vulnerability CVE-2025-24043, remote code execution (RCE) through improper cryptographic signature validation in the SOS debugging extension.
The vulnerability affects critical .NET diagnostic packages including dotnet-sos, dotnet-dump, and dotnet-debugger-extensions, which are integral to .NET...
Microsoft Sentinel Launched Agentless Integration for SAP Security
With critical SAP vulnerabilities being weaponized within 72 hours of a patch release, and unprotected SAP applications provisioned in cloud environments being discovered and compromised in under three hours, securing SAP landscapes has become...
Microsoft 365 Anti-phishing Feature Bypassed Using CSS Style Tags
Phishing is the most effective method for an attacker to infiltrate an organization. Several attack methods and techniques are available for an attacker to send a phishing email.
On the other hand, email clients such...