Securing our future: April 2025 progress report on Microsoft’s Secure Future Initiative
The Microsoft Secure Future Initiative (SFI) stands as the largest cybersecurity engineering project in history and most extensive effort of its kind at Microsoft. Now, we are sharing the second SFI progress report, which highlights progress made in our multi-year journey to improve the security posture of Microsoft, our customers, and the industry at large.
Microsoft Entra account lockouts caused by user token logging mishap
Microsoft confirms that the weekend Entra account lockouts were caused by the invalidation of short-lived user refresh tokens that were mistakenly logged into internal systems.
Microsoft strengthens in-house cyber governance, training
The technology giant, as part of its Secure Future Initiative program, has overhauled security practices following a series of crippling nation-state-linked cyberattacks.
Virtual Patching: How to Protect VMware ESXi | CSA
Recent CVEs were patched amid concerns of exploitation. While traditional patching requires downtime, virtual patching allows critical systems to stay online.
State-sponsored hackers embrace ClickFix social engineering tactic
ClickFix attacks are being increasingly adopted by threat actors of all levels, with researchers now seeing multiple advanced persistent threat (APT) groups from North Korea, Iran, and Russia utilizing the tactic to breach networks.
Phishers abuse Google OAuth to spoof Google in DKIM replay attack
In a rather clever attack, hackers leveraged a weakness that allowed them to send a fake email that seemed delivered from Google's systems, passing all verifications but pointing to a fraudulent page that collected logins.
WordPress ad-fraud plugins generated 1.4 billion ad requests per day
A large-scale ad fraud operation called 'Scallywag' is monetizing pirating and URL shortening sites through specially crafted WordPress plugins that generate billions of daily fraudulent requests.
Five Keys to Choosing a Cloud Security Provider | CSA
Cloud security providers aren't all the same, and knowing what to look for and what questions to ask when making a decision comes down to five keys to success.
Pour piéger les diplomates européens, les hackers russes les invitent « à boire un excellent verre de vin »
Une campagne d'espionnage menée depuis la Russie tente de piéger les politiques européens avec de fausses invitations envoyées par mail. Une fois la pièce jointe ouverte, l'ordinateur de la victime sera infecté et va offrir toutes ses informations aux hackers. Les pirates de Moscou mènent une nouvelle campagne de
Japan warns of hundreds of millions of dollars in unauthorized trades from hacked accounts
Japanese regulators published an urgent warning about hundreds of millions of dollars worth of unauthorized trades being conducted on hacked brokerage accounts in the country.
AI Red Teaming: Insights from the Front Lines | CSA
Uncover key insights from AI red teaming experts on securing generative AI systems against adversarial attacks, harmful outputs, and infrastructure risks.
How next-generation firewalls are evolving in a world of AI-enabled cyberattacks
Discover how Next-Generation Firewalls are adapting to combat AI-enabled cyberattacks and evolving to protect organizations in today's dynamic threat landscape.
Une cyberattaque sur une maquette en LEGO permet d'illustrer l'arrêt d'une usine - Numerama
Un expert en cybersécurité démontre aux entreprises, à travers une maquette en LEGO, comment une cyberattaque peut mettre en péril une chaîne de production. Un simple zéro tapé sur un clavier et la machine s’arrête. En quelques secondes, une chaîne de production peut être paralysée et une entreprise mise à l'arrêt
Widespread Microsoft Entra lockouts tied to new security feature rollout
Windows administrators from numerous organizations report widespread account lockouts triggered by false positives in the rollout of a new Microsoft Entra ID's "leaked credentials" detection app called MACE.
Critical Erlang/OTP SSH RCE bug now has public exploits, patch now
Public exploits are now available for a critical Erlang/OTP SSH vulnerability tracked as CVE-2025-32433, allowing unauthenticated attackers to remotely execute code on impacted devices.
New Android malware steals your credit cards for NFC relay attacks
A new malware-as-a-service (MaaS) platform named 'SuperCard X' has emerged, targeting Android devices via NFC relay attacks that enable point-of-sale and ATM transactions using compromised payment card data.