However, these rules of engagement prohibit red teamers from using or accessing credentials that aren’t their own, launching phishing attacks against Microsoft employees, performing denial-of-service testing or other testing that …
Microsoft
Microsoft Patch Tuesday, December 2025 Edition – Krebs on Security
Microsoft today pushed updates to fix at least 56 security flaws in its Windows operating systems and supported software. This final Patch Tuesday of 2025 tackles one zero-day bug that …
Rhysida ransomware exploits Microsoft certificate to slip malware past defenses
“Microsoft Trusted Signing certificates are issued with a 72-hour validity period. After that, the certificates expire and need to be renewed. This short period makes the standard process of purchasing …
Microsoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign
Oct 17, 2025Ravie LakshmananMalware / Cybercrime Microsoft on Thursday disclosed that it revoked more than 200 certificates used by a threat actor it tracks as Vanilla Tempest to fraudulently sign …
Microsoft Patch Tuesday, September 2025 Edition – Krebs on Security
Microsoft Corp. today issued security updates to fix more than 80 vulnerabilities in its Windows operating systems and software. There are no known “zero-day” or actively exploited vulnerabilities in this …
VoidProxy phishing-as-a-service operation steals Microsoft, Google login credentials
“By offering this sophisticated PhaaS, VoidProxy lowers the technical barrier for a wide range of threat actors to execute AitM phishing attacks. Accounts compromised using PhaaS platforms facilitate numerous malicious …
Microsoft today released updates to fix more than 100 security flaws in its Windows operating systems and other software. At least 13 of the bugs received Microsoft’s most-dire “critical” rating, …
“The phishing campaigns leverage multi-factor authentication (MFA) attacker-in-the-middle (AiTM) phishing kits like Tycoon,” researchers added. “Such activity could be used for information gathering, lateral movement, follow-on malware installations, or to …