Microsoft

Security Compass expands support for OpSec, adding Microsoft Azure to its knowledge library
Security Compass announced it has expanded on operational security (OpSec) requirements available in the SD Elements’ knowledge library, with support for Microsoft Azure …

Windows zero-day flaw and PoC unveiled via Twitter
A Windows zero-day local privilege escalation flaw and a Proof-of-Concept exploit for it have been revealed on Monday by someone who goes by SandboxEscaper on Twitter. The …
Code42’s data security platform reduces user downtime and costs for Windows 10 migrations
Code42 announced enhancements for Windows 10 Device Migration. Designed to help organizations reduce risks and costs related to data loss, user downtime and lost productivity, …
SUSE and Microsoft collaborate to deliver enterprise Linux kernel optimized for Azure
SUSE announced the availability of the enterprise Linux kernel tailored for Microsoft Azure. SUSE Linux Enterprise Server 15 on-demand instances now run on a custom-tuned …

August 2018 Patch Tuesday: Microsoft fixes two actively exploited zero-days
In the August 2018 Patch Tuesday, Microsoft has plugged over 60 vulnerabilities, two of which are being actively exploited in the wild. In addition to those, the company has …

New Office 365 phishing attack uses malicious links in SharePoint documents
Fake emails targeting Office 365 users via malicious links inserted into SharePoint documents are the latest trick phishers employ to bypass the platform’s built-in …

Microsoft ADFS flaw allows attackers to bypass MFA safeguards
A vulnerability (CVE-2018-8340) in Microsoft Active Directory Federation Services (ADFS) allows a second authentication factor for one account to be used for all other …

August Patch Tuesday forecast: Looking ahead after a frustrating July
Approaching August Patch Tuesday, we are supposed to be in the ‘dog days’ of summer where everything slows down. Unfortunately, July was full of CVEs and stability fixes with …

IaaS public cloud services market grew 29.5% in 2017
The worldwide infrastructure as a service (IaaS) market grew 29.5 percent in 2017 to total $23.5 billion, up from $18.2 billion in 2016, according to Gartner. Amazon was the …
LogMeIn unveils secure federated login to LastPass with Active Directory
LastPass by LogMeIn announced a new integration with Microsoft’s Active Directory Federation Services (“ADFS”), providing organizations utilizing Microsoft ADFS with the …
Sabre selects Red Hat OpenShift Container Platform to support its Next Generation Platform
Sabre announced that the company has extended its existing relationship with Red Hat to leverage Red Hat OpenShift Container Platform as the foundation for its Next Generation …
Veeam Backup v2 for Microsoft Office 365 delivers data protection and recovery
Veeam Software released new Veeam Backup for Microsoft Office 365 v2. This release now protects Microsoft OneDrive for Business, SharePoint Online, and SharePoint on-premises …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility