Singapore accuses Chinese state-backed hackers of attacking critical infrastructure networks
A top official did not disclose details of UNC3886’s activity but said “it is serious and it’s ongoing … and we will assess whether it is in our interest to disclose more details later.”
Microsoft mistakenly tags Windows Firewall error log bug as fixed
Microsoft has mistakenly tagged an ongoing Windows Firewall error message bug as fixed in recent updates, stating that they are still working on a resolution.
UK ties GRU to stealthy Microsoft 365 credential-stealing malware
The UK National Cyber Security Centre (NCSC) has formally attributed 'Authentic Antics' espionage malware attacks to APT28 (Fancy Bear), threat actor already linked to Russia's military intelligence service (GRU).
Japanese police release decryptor for Phobos ransomware after February takedown
Victims of Phobos ransomware and its 8Base offshoot now have access to a decryptor released by Japanese law enforcement and backed by the FBI and European officials.
Russian alcohol retailer WineLab closes stores after ransomware attack
WineLab, the retail store of the largest alcohol company in Russia, has closed its stores following a cyberattack that is impacting its operations and causing purchase problems to its customers.
​​Microsoft at Black Hat USA 2025: A Unified Approach to Modern Cyber Defense​​
Microsoft will be at Black Hat USA 2025, August 5–7 in Las Vegas, and we’re bringing you a unified, practitioner-driven experience built around real-world insights, threat intelligence, incident response, and hands-on AI expertise.
We believe security teams are strongest when intelligence, tools, and deep expertise come together. At Microsoft, we’ve eliminated internal silos between threat intelligence, red teaming, incident response, and product engineering. That closed-loop system lets us move faster, translating threat signals into global protection every day.
This integration isn’t theoretical. It means when researchers detect a threat through our global network, that information flows directly to the red team stress-testing our defenses, the incident responders investigating real intrusions, and the engineering teams building new mitigations; all at once. It's a system designed to learn, adapt, and protect at scale. At Black Hat, we’re opening that loop so you can see how it works and inviting you to see how it can help you defend at AI speed. Want to meet the people behind our operations? Request an invite to our Black Hat VIP mixer.
Start your Black Hat journey early with the Microsoft Threat Intelligence Podcast
Before Black Hat kicks off, hear from Black Hat NOC lead Grifter and Lintile in our latest episode of the Microsoft Threat Intelligence Podcast. They explore what it takes to secure one of the world’s most high-profile cybersecurity conferences, what the Black Hat Network Operations Center (NOC) sees in real time, and how defenders can apply those lessons to their own environments. Whether you're attending in person or following along remotely, this episode offers a rare look into threat activity and security insights from inside the NOC.
Meet us at Booth 2246: Conversations, not presentations.
Figure 1: Crowd at Booth 2246
Skip the crowded theater sessions and pull up a chair. Throughout the day, we’re hosting informal conversations at our mobile podcast studio and then shifting to expert meetups where your questions will be answered. At booth 2246, you’ll hear directly from Microsoft security experts on what they’re seeing, and how you can apply it. Topics include:
Addressing the ransomware threat landscape
Defending against BEC attacks
Shifts in social engineering and phishing
Securing non-human identities (agents)
And a few surprises
We’ll also be inviting our friends from the Microsoft Threat Intelligence Podcast, Microsoft BlueHat podcast (MSRC), GitHub, and a few special guests.
Each session is a chance to hear what our teams are seeing in the wild, how we’re responding, and how you can apply those insights in your own environment. Whether it's a live threat briefing, a deep dive into red teaming, or a behind-the-scenes look at real incident response, these are unscripted, interactive discussions designed for defenders and researchers. 
Demos of Microsoft Defender, Microsoft Entra, Microsoft Purview, and Microsoft Security Copilot will run throughout the week. Stop by to talk shop, ask questions, or just get a clearer view of why our AI-first, end-to-end platform is designed to help you move faster, respond with precision, and adapt to new threats with confidence.
Connect with the experts at our VIP Mixer
Figure 2: Microsoft Security VIP Mixer
You’re invited to connect with the people behind the defense at our VIP Mixer on Wednesday, Aug. 6. Join Microsoft Security for an evening of conversations, insights, and connections with our threat intelligence, incident response, and Security Copilot teams, alongside your peers from across the security community. 
Whether you're exploring how to put AI agents to work, navigating advanced threats, or evolving your detection and response strategy, this is your chance to meet the experts and teams helping defenders stay ahead.
Security is a team sport, and we would like to thank Armor, Cyberproof, Forescout, Ontinue and Security Risk Advisors members of the Microsoft Intelligent Security Association (MISA) for sponsoring this event.
Drinks and appetizers will be provided. Request to attend today!   
Session Spotlight: Gain practical strategies for unmasking cyber threats
Thursday, August 7 | 12:15–12:40 PM
In a threat landscape shaped by AI and threat actors, cybersecurity teams need more than tools; they need the right mindset, collaboration models, and playbooks to stay ahead. During our main stage session, we will bring together frontline experts from Microsoft Security—Sherrod DeGrippo, Director, Threat Intelligence Strategy, Aarti Borkar, Corporate Vice President, Customer Success and Incident Response, Andrew Rapp, Leader, Incident Response and Simeon Kakpovi, —to share how they approach high-impact intrusions and what defenders everywhere can take away from it.
This session will offer practical strategies grounded in real-world operations, including:
How to build tighter alignment across threat intel, IR, and detection teams
Approaches to reduce friction and accelerate signal-to-action response time
Lessons from tracking threat actors focused on social engineering and ransomware
Ways to adapt red teaming and detection in a rapidly evolving AI landscape
Whether you're refining your team’s structure or looking for sharper ways to think about advanced threats, this conversation will deliver actionable insight you can bring back to your own environment.
Inside Look: How Microsoft Red Teams Stay in Sync
Wednesday, August 6 | 11:25–11:45 AM
What happens when red teams operate not in isolation, but as a connected part of a broader defense ecosystem?
Microsoft security experts Ram Shankar Siva Kumar (founder of the AI Red Team) and Craig Nelson (Microsoft Red Team) will explore how traditional and AI red teams work side by side to proactively test Microsoft’s products, platforms, and AI systems.
You’ll hear how these teams:
Identify systemic risks across cloud and enterprise services
Probe generative AI systems for jailbreaks and indirect misuse
Collaborate with MSRC and threat researchers to close the loop from discovery to defense
Embed red teaming into engineering cycles, not just as a check, but as a design influence
Whether you’re red-teaming your own products or rethinking how to operationalize adversarial testing, this session will offer lessons in collaboration, tooling, and mindset from two of the most advanced offensive security teams in the industry.
Exchange ideas with other MISA members
The Microsoft booth will include a featured partner demo station where 7 partners from the Microsoft Intelligent Security Association (MISA) will showcase how their solutions together with Microsoft Security technology help defend our mutual customers from cybersecurity threats.
Connect with us at the Microsoft booth to find out more.
Figure 3: MISA Demo Station
Connect with us at Black Hat US
Cybersecurity is a team sport and defending against threats takes a cohesive approach that brings multiple disciplines and experts across specialties together. We’re committed to eliminating internal silos to focus on threat hunting that supports a comprehensive defense.
You’ll hear more of this approach and how it can benefit your organization at Black Hat US.
Check out Microsoft Security executives at the AI Summit at Black Hat (separate pass required)
Request to attend our VIP Mixer to meet the experts behind Microsoft threat intelligence, incident response, and the Microsoft Security Response Center.
Discover how our end-to-end platform can help you strengthen resilience and elevate your security posture.
Get an exclusive $200 briefings and $100 business hall pass discount to share with your customers and prospects.
Sign up for a one-on-one meeting with Microsoft Security experts.
Listen to our Threat Intelligence Podcast.
Visit us in Booth #2246 for a live demo and learn how our AI-powered cybersecurity can protect your organization.
Hope to see you at Black Hat!
New Phobos ransomware decryptor lets victims recover files for free
The Japanese police have released a Phobos and 8-Base ransomware decryptor that lets victims recover their files for free, with BleepingComputer confirming that it successfully decrypts files.
Hackers scanning for TeleMessage Signal clone flaw exposing passwords
Researchers are seeing exploitation attempts for the CVE-2025-48927 vulnerability in the TeleMessage SGNL app, which allows retrieving usernames, passwords, and other sensitive data.
CISA Issues Advisories on Critical ICS Vulnerabilities Across Multiple Sectors
The US CISA has issued advisories for Industrial Control Systems vulnerabilities affecting multiple vendors including Johnson Controls, ABB, Hitachi Energy, and Schneider Electric
Russia Linked to New Malware Targeting Email Accounts for Espionage
Russian military intelligence-linked hackers are using a new malware called “Authentic Antics” to secretly access Microsoft cloud email accounts, the UK's NCSC reports
New Mobile Phone Forensics Tool - Schneier on Security
The Chinese have a new tool called Massistant. Massistant is the presumed successor to Chinese forensics tool, “MFSocket”, reported in 2019 and attributed to publicly traded cybersecurity company, Meiya Pico. The forensics tool works in tandem with a corresponding desktop software. Massistant gains access to device GPS location data, SMS messages, images, audio, contacts and phone services. Meiya Pico maintains partnerships with domestic and international law enforcement partners, both as a surveillance hardware and software provider, as well as through training programs for law enforcement personnel...
New “LameHug” Malware Deploys AI-Generated Commands
Ukraine’s CERT-UA has identified a new AI-powered malware, dubbed “LameHug,” which executes commands on compromised Windows systems in cyber-attacks, targeting the nation’s security and defense sector