Microsoft

Bluetooth vulnerability allows snooping of traffic between paired devices
Researchers Eli Biham and Lior Neumann have discovered a vulnerability in two Bluetooth features that could be exploited by attackers to gain a man-in-the-middle position and …
Change Healthcare gives payers and providers the keys to cloud security
Change Healthcare is providing healthcare leaders the keys to cloud security with Change Healthcare Security Management, which includes a “Bring Your Own Key” …
Rapid7 integrates with Microsoft Azure to provide visibility, analytics, and automation for cloud security
Rapid7 announced integration between Rapid7’s Insight platform and Microsoft Azure. This integration provides vulnerability management, analytics-driven incident detection for …

Microsoft offers bug bounties for holes in its identity services
Microsoft is asking security researchers to look for and report technical vulnerabilities affecting its identity services and OpenID standards implementations, and is offering …

Microsoft tops list of brands impersonated by phishers
The number one brand spoofed by phishers in Q2 2018 in North America was Microsoft, says email security company Vade Secure. The company credits the surging of adoption of …
SoftwareONE launches Security for Microsoft 365
SoftwareONE announced that it has launched Security for Microsoft 365, a managed service that enhances the security of Microsoft 365 environments as well as manages and …
ClearDATA launches healthcare compliant cloud offering on Microsoft Azure
ClearDATA has launched a healthcare compliant offering for Microsoft Azure. The offering helps healthcare organizations operating on Azure to innovate and scale while …

Microsoft plugs 53 security holes in July 2018 Patch Tuesday
For its July 2018 Patch Tuesday, Microsoft has patched 53 vulnerabilities. 17 of them are critical and 16 of those affect Internet Explorer and Edge. Microsoft updates …

Is Windows ShimCache a threat hunting goldmine?
Enterprise-wide threat hunting sounds like a daunting task and for inexperienced forensic analysts it certainly can be. However, there are various techniques that can be used …

July 2018 Patch Tuesday forecast: The fireworks and the finale
Patch management is kind of like fireworks around the fourth of July. Momentary excitement with lulls that repeat several times until the culminate in a finale! Well there are …

How connected and secure is the modern workplace?
In collaboration with Microsoft, Ingram Micro Cloud UK commissioned market research firm YouGov to survey 1,000 workers employed by small and mid-size businesses with 50 to …

How Facebook and Google nudge users to make anti-privacy choices
Facebook, Google and Microsoft use design techniques and tricks to steer users toward sharing more information about themselves to benefit those businesses, the Norwegian …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility