Microsoft enforces defenses preventing NTLM relay attacks
Since making Kerberos the default Windows authentication protocol in 2000, Microsoft has been working on eventually retiring NTLM, its less secure and obsolete counterpart. Until NTLM gets disabled by default, Microsoft is working on shoring up defen.....»»
Copilot+ laptop for under $1,000 with this Best Buy deal
The Acer Swift 14 AI, a Copilot+ laptop that's designed to take advantage of Microsoft's AI assistant, is on sale from Best Buy for $800 after a $400 discount......»»
Microsoft introduces feature that enables file sharing between iPhone and Windows PCs
Microsoft on Wednesday announced a new feature coming soon to Windows that will let users easily share files between an iPhone and a PC, similar to Apple’s AirDrop – which is only available on Apple devices. more….....»»
Report: Google told FTC Microsoft’s OpenAI deal is killing AI competition
Microsoft gatekeeping OpenAI models saddles AI rivals with costs, report says. Google reportedly wants the US Federal Trade Commission (FTC) to end Microsoft's exclusive cloud dea.....»»
Microsoft enforces defenses preventing NTLM relay attacks
Since making Kerberos the default Windows authentication protocol in 2000, Microsoft has been working on eventually retiring NTLM, its less secure and obsolete counterpart. Until NTLM gets disabled by default, Microsoft is working on shoring up defen.....»»
Trellix Drive Encryption enhances security against insider attacks
Trellix announced Trellix Drive Encryption upgrades for on-premises and SaaS management. Customers benefit from the flexibility needed for encryption protection deployment to safeguard their data and devices from unauthorized access. “The major.....»»
You can now use an external webcam with Microsoft Teams on your iPad. Here’s how
Like using Microsoft Teams on your iPad? Now you can finally use it with an external camera......»»
US sanctions Chinese cybersecurity company for firewall compromise, ransomware attacks
The Department of the Treasury is sanctioning Chinese cybersecurity company Sichuan Silence, and one of its employees, Guan Tianfeng, for their roles in the April 2020 compromise of tens of thousands of firewalls worldwide. Many of the victims were U.....»»
Microsoft fixes exploited zero-day (CVE-2024-49138)
On December 2024 Patch Tuesday, Microsoft resolved 71 vulnerabilities in a variety of its products, including a zero-day (CVE-2024-49138) that’s been exploited by attackers in the wild to execute code with higher privileges. CVE-2024-49138 expl.....»»
Windows 11 can now run on unsupported systems, but there’s a catch
Microsoft is now allowing PC users to install Windows 11 on unsupported systems, though updates will have to be done manually......»»
Preventing data leakage in low-node/no-code environments
Low-code/no-code (LCNC) platforms enable application development by citizen developers, often generating “shadow engineering” projects that evade security oversight. While LCNC solutions like Power BI reports and automated workflows foster agilit.....»»
Apple is the best-managed company in the US, ranking claims
Apple is the best-run company in the United States, according to this year’s Management Top 250 ranking from the Drucker Institute. Apple dethroned Microsoft for the title, which had held it for the past four years. Microsoft slipped to third place.....»»
Microsoft challenges you to hack its LLM email service
AI hackers have the chance to earn a little extra cash this Christmas by identifying vulnerabilities......»»
Hornetsecurity boosts 365 Total Backup with self-service recovery for end users
Hornetsecurity unveiled an upgraded version of its 365 Total Backup solution, introducing self-service recovery for end users while also offering full backup and recovery support for Microsoft OneNote. This new functionality is also available with 36.....»»
RSA expands phishing-resistant, passwordless capabilities
RSA announced expanded phishing-resistant, passwordless capabilities. Built to secure financial services organizations, government agencies, healthcare, and other highly-regulated industries from the most frequent and highest-impact attacks, these ne.....»»
Skyhigh Security strengthens data protection for Microsoft Copilot
Skyhigh Security announced the expansion of its purpose-built data protection capabilities to secure Microsoft Copilot, the fastest-growing AI solution in the enterprise. This latest milestone underscores Skyhigh Security’s commitment to enabling s.....»»
Microsoft: “Hack” this LLM-powered service and get paid
Microsoft, in collaboration with the Institute of Science and Technology Australia and ETH Zurich, has announced the LLMail-Inject Challenge, a competition to test and improve defenses against prompt injection attacks. The setup and the challenge LLM.....»»
Microsoft tipped to give its Surface devices a major Intel refresh in 2025
A new report outlines what Microsoft is planning for its Surface products across the next 12 months......»»
Microsoft discontinues lackadaisically updated Surface Studio all-in-one desktop
This expensive all-in-one's unique screen was the only thing going for it. Microsoft has formally discontinued its Surface Studio all-in-one desktop, the company confirmed to Wind.....»»
GenAI makes phishing attacks more believable and cost-effective
GenAI is a powerful tool that can be used by security teams to protect organizations, however, it can also be used by malicious actors, making phishing-related attacks a growing and concerning threat vector, according to Ivanti. Ivanti’s resear.....»»
Building a robust security posture with limited resources
In this Help Net Security interview, Gareth Lindahl-Wise, CISO at Ontinue, discusses how business leaders can align innovation with cybersecurity, tackle the risks posed by legacy systems, and build defenses for startups. Lindahl-Wise also highlights.....»»