Security vendors under suspicion for leaks while AI casually helps reproduce exploits - it's like worrying about the front door while the window's wide open Microsoft's response? Trust no one, apparently.

Security vendors under suspicion for leaks while AI casually helps reproduce exploits - it's like worrying about the front door while the window's wide open Microsoft's response? Trust no one, apparently.
Hundreds of organizations breached by #SharePoint mass-hacks
https://techcrunch.com/2025/07/23/hundreds-of-organizations-breached-by-sharepoint-mass-hacks/
Hackers exploiting SharePoint zero-day seen targeting government agencies
The hackers behind the initial wave of attacks exploiting a zero-day in Microsoft SharePoint servers have so far primarily targeted government organizations
#microsoft #SharePoint #zeroday #security #cybersecurity #hackers #hacking #hacked
An explanation of from ol' DavePl... of how bad this 9.8 rated SharePoint vulnerability is.
"Think of CrowdStrike incident... but with data theft."
Windows SharePoint Hacked Worldwide: Ex-Microsoft Engineer's Urgent Warning & Fix
https://youtube.com/watch?v=L7EWXnPslA8&si=bX8Qt2zir0BA8g25
#sharepoint #cybersecurity #hack
Oh wow, someone already made #Metasploit modules that target CVE-2025-53770 and CVE-2025-53771 in the recent #SharePoint 0-Day vulnerabilities
This Week in Security: Sharepoint, Initramfs, and More - There was a disturbance in the enterprise security world, and it started with a Pw... - https://hackaday.com/2025/07/25/this-week-in-security-sharepoint-initramfs-and-more/ #thisweekinsecurity #hackadaycolumns #securityhacks #secureboot #sharepoint #linux
Microsoft got hacked – and that’s not even the worst part.
It’s now confirmed: sensitive data in European clouds can be handed over to US authorities. So how do you protect your team’s files – even when the cloud is no longer safe?
Cryptomator Hub gives you true end-to-end encryption & zero-knowledge access control.
Swipe to see how it works.
Im aktuellen Podcast analysieren @sveckert und ich den Weg der Sharepoint-Sicherheitslücke vom Hacker:innen-Contest "Pwn2Own" in Berlin in die Hände des chinesischen Geheimdienstes (und wohl auch anderer staatlicher Spione). Und wir sprechen mit der wunderbaren Vera Bauer über ihre Erfahrungen als Tech-Youtuberin mit Konzernen, Männern und einer dreisten Firma, die ihr Gesicht und ihre Stimme geklaut hat.
Storm-2603 hackers went from "we just want your data" to "pay up or else" faster than you can say SharePoint vulnerability. 400 organizations learned the hard way that espionage groups are pivoting to ransomware - why steal secrets when you can steal money too?
Rising activity of #SharePoint #phishing domains is covered in the latest TI Report from the #ANYRUN team.
Discover more expert analyses on active threats and APTs, with #IOCs & TTPs to strengthen your proactive defense.
#BREAKING #ESETResearch has been monitoring the recently discovered #ToolShell zero-day vulnerabilities in #SharePoint Server: CVE-2025-53770 and CVE-2025-53771. SharePoint Online in Microsoft 365 is not impacted. https://www.welivesecurity.com/en/eset-research/toolshell-an-all-you-can-eat-buffet-for-threat-actors/
ESET first detected an attempt to exploit part of the execution chain on July 17 in Germany . Here, the final #webshell payload was not delivered. The first time we registered the payload was on July 18 in Italy
. We have since seen active ToolShell exploitation all over the world.
We have uncovered several IP addresses that were used in the attacks from July 17 to July 22. The charts show the timeline of the attacks from the three most active of these IP addresses.
ToolShell is being exploited by all sorts of threat actors, from petty cybercriminals to state-sponsored groups, among them China -aligned #APTs. We expect these attacks to continue taking advantage of unpatched systems.
IoCs available in our GitHub repo: https://github.com/eset/
This #SharePoint exploit is pretty intense! https://techcentral.co.za/south-africa-microsoft-sharepoint-attacks/267185/?utm_source=MastodonAfrica #infosec
U.S. #CISA urges FCEB agencies to fix two #Microsoft #SharePoint flaws immediately and added them to its Known Exploited Vulnerabilities catalog
https://securityaffairs.com/180301/hacking/u-s-cisa-adds-two-microsoft-sharepoint-flaws-to-its-known-exploited-vulnerabilities-catalog.html
#securityaffairs #hacking
What to know about ToolShell, the SharePoint threat under mass exploitation - Government agencies and private industry have been under sie... - https://arstechnica.com/security/2025/07/what-to-know-about-toolshell-the-sharepoint-threat-under-mass-exploitation/ #vulnerabilities #sharepoint #toolshell #security #exploits #biz&it
Hehehe...
"The US agency responsible for maintaining and designing the nation’s cache of nuclear weapons was among those breached by a hack of Microsoft Corp.’s SharePoint document management software, according to a person with knowledge of the matter.
No sensitive or classified information is known to have been compromised in the attack on the National Nuclear Security Administration, said the person, who wasn’t authorized to speak publicly and asked not to be identified. The semiautonomous arm of the Energy Department is responsible for producing and dismantling nuclear arms. Other parts of the department were also compromised.
(...)
The NNSA has a broad mission, which includes providing the Navy with nuclear reactors for submarines and responding to radiological emergencies, among other duties. The agency also plays a key role in counterterrorism and transporting nuclear weapons around the country.
Hackers were able to breach the agency as part of a 2020 attack on a widely used software program from SolarWinds Corp. A department spokesperson said then that malware had “been isolated to business networks only.”"
https://www.europesays.com/2269569/ Microsoft SharePoint hack affected US Energy Department, nuclear weapons agency #Energy #Microsoft #MicrosoftNews #nuclear #SharePoint #TechNew
When your nuclear secrets are less secure than your average WordPress blog
400 organizations breached via unpatched SharePoint servers - proving that even the most sensitive agencies can fall victim to basic IT hygiene failures. Sometimes the biggest threats come from the smallest oversights.