#windows-administrator-protection

[ follow ]
#microsoft
Information security
fromInfoWorld
2 days ago

Microsoft's reauthentication snafu cuts off developers globally

Microsoft is addressing a reauthentication issue that has blocked some independent software vendors from accessing its systems.
World news
fromTheregister
3 days ago

Microsoft hints at bit bunkers for war zones

Microsoft is redesigning datacenters in conflict-prone regions due to Iranian attacks targeting Middle Eastern facilities linked to US military operations.
Tech industry
fromTheregister
1 week ago

Microsoft plans another out-of-band Windows fix

Microsoft is releasing an out-of-band update to fix installation errors from a problematic preview update.
Information security
fromTheregister
2 weeks ago

Microsoft releases emergency fix for account internet error

Microsoft released an out-of-band update to fix bugs from a recent Windows patch, addressing a Microsoft account issue causing login errors.
Information security
fromInfoWorld
2 days ago

Microsoft's reauthentication snafu cuts off developers globally

Microsoft is addressing a reauthentication issue that has blocked some independent software vendors from accessing its systems.
World news
fromTheregister
3 days ago

Microsoft hints at bit bunkers for war zones

Microsoft is redesigning datacenters in conflict-prone regions due to Iranian attacks targeting Middle Eastern facilities linked to US military operations.
Tech industry
fromTheregister
1 week ago

Microsoft plans another out-of-band Windows fix

Microsoft is releasing an out-of-band update to fix installation errors from a problematic preview update.
Information security
fromTheregister
2 weeks ago

Microsoft releases emergency fix for account internet error

Microsoft released an out-of-band update to fix bugs from a recent Windows patch, addressing a Microsoft account issue causing login errors.
fromTechzine Global
1 day ago

Hospital modernizes data protection with Synology ActiveProtect

The most significant outcome of St. Nikolaus-Hospital's switch to a Synology ActiveProtect Appliance is undoubtedly the ROI reported by the hospital. De Sélys and Bovy expect a 238 percent increase in ROI over the next five years.
Healthcare
Privacy technologies
fromTechCrunch
3 days ago

WireGuard VPN developer can't ship software updates after Microsoft locks account | TechCrunch

WireGuard is locked out of its Microsoft developer account, preventing critical software updates for Windows users.
DevOps
fromDevOps.com
4 days ago

Why Most DevSecOps Pipelines Fail at Runtime Security (not Build Time) - DevOps.com

Runtime risk arises from configuration and infrastructure changes post-deployment, necessitating DevSecOps to enhance security earlier in the delivery process.
#cybersecurity
fromTechSpot
2 days ago
Information security

Hackers are turning home routers into tools to spy on Microsoft 365 users

fromTechCrunch
3 weeks ago
Information security

CISA urges companies to secure Microsoft Intune systems after hackers mass-wipe Stryker devices | TechCrunch

Information security
fromTechSpot
2 days ago

Hackers are turning home routers into tools to spy on Microsoft 365 users

Forest Blizzard hackers exploit insecure routers to compromise devices and intercept traffic, targeting Microsoft 365 domains for sensitive data.
Information security
fromThe Hacker News
5 days ago

Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations

An Iran-linked threat actor is conducting a password-spraying campaign targeting Microsoft 365 environments in Israel and the U.A.E.
Information security
fromTechCrunch
3 weeks ago

CISA urges companies to secure Microsoft Intune systems after hackers mass-wipe Stryker devices | TechCrunch

Pro-Iran hackers breached Stryker's device management systems and mass-wiped thousands of employee devices, prompting CISA to urge companies to implement multi-administrator approval for sensitive endpoint changes.
Information security
fromSecuritymagazine
3 weeks ago

Document Protection: Why Hybrid Storage Is the Future of Security

A hybrid approach combining digital storage for frequently accessed documents and physical storage for sensitive historical information provides optimal security and efficiency.
#microsoft-intune
Software development
fromTechzine Global
1 week ago

Microsoft rejiggers Intune to give patches time to prove themselves

Microsoft Intune will shift from pushing patches to measuring compliance with defined update standards, emphasizing policy and outcomes over delivery.
Software development
fromTechzine Global
1 week ago

Microsoft rejiggers Intune to give patches time to prove themselves

Microsoft Intune will shift from pushing patches to measuring compliance with defined update standards, emphasizing policy and outcomes over delivery.
fromSpeckyboy Design Magazine
6 days ago

How To Protect Media Files Uploaded to WordPress - Speckyboy

The predictable file structure of the content management system makes it easy to guess where a file is stored, leading to potential leaks, as demonstrated by a journalist accessing a leaked UK budget document.
Privacy technologies
Information security
fromThe Hacker News
2 days ago

ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories

A new variant of the Phorpiex botnet combines traditional and peer-to-peer communication, facilitating sophisticated malware operations and high-volume spam.
Information security
fromSecurityWeek
2 days ago

Palo Alto Networks, SonicWall Patch High-Severity Vulnerabilities

Palo Alto Networks and SonicWall released patches for multiple vulnerabilities, including high-severity bugs that could allow unauthorized access and code execution.
Information security
fromThe Hacker News
3 days ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
European startups
fromTheregister
3 weeks ago

Microsoft 365 pauses Copilot creep after admins cry foul

Microsoft paused automatic deployment of the Microsoft 365 Copilot app to users, postponing forced installations indefinitely after negative customer feedback.
Information security
fromTechRepublic
3 days ago

Why Operationalizing AI Security Is the Next Great Enterprise Hurdle

Security operations lag behind rapid tech advancements, leading to inefficiencies and risks in managing numerous security tools.
Information security
fromThe Hacker News
3 days ago

Anthropic's Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems

Anthropic's Project Glasswing uses Claude Mythos to identify and address cybersecurity vulnerabilities, surpassing human capabilities in some instances.
Privacy technologies
fromAzure DevOps Blog
3 weeks ago

Authentication Tokens Are Not a Data Contract - Azure DevOps Blog

Authentication tokens should only validate authorization, not serve as data interfaces; upcoming encryption will make token payloads unreadable, breaking applications that decode token claims.
Information security
fromTechRepublic
3 days ago

'BlueHammer' Exploit Targets Windows, Potentially Impacting 1 Billion+ Devices

A security researcher released exploit code for a Windows zero-day vulnerability called BlueHammer, allowing privilege escalation without an official Microsoft patch.
DevOps
fromAzure DevOps Blog
4 weeks ago

March Patches for Azure DevOps Server - Azure DevOps Blog

Azure DevOps Server Patch 2 addresses a group membership deactivation issue for customers who installed prior to March 13, 2026.
Information security
fromSecuritymagazine
4 days ago

Ransomware Response: How Businesses Regain Control Under Pressure

Ransomware attacks create urgent pressure, forcing quick decisions and impacting operations, legal obligations, and overall enterprise strategy.
Information security
fromThe Hacker News
4 days ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Information security
fromTheregister
4 days ago

Hundreds compromised daily in Microsoft device code phishes

A Microsoft device-code phishing campaign is compromising hundreds of organizations daily, utilizing AI and automation to steal financial data.
Information security
fromTheregister
5 days ago

AI agents found vulns in this Linux and Unix print server

Two vulnerabilities in CUPS allow unauthenticated remote code execution and root file overwrite, posing significant security risks in networked environments.
#fortinet
Information security
fromTechRepublic
5 days ago

New Fortinet Flaw Allows Unauthorized Access to Enterprise Systems

A critical FortiClient EMS vulnerability allows unauthenticated attackers to bypass protections and execute unauthorized commands on systems.
fromThe Hacker News
6 days ago
Information security

Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS

Fortinet released patches for a critical vulnerability in FortiClient EMS, allowing unauthenticated attackers to execute unauthorized commands.
Information security
fromTechRepublic
5 days ago

New Fortinet Flaw Allows Unauthorized Access to Enterprise Systems

A critical FortiClient EMS vulnerability allows unauthenticated attackers to bypass protections and execute unauthorized commands on systems.
Information security
fromThe Hacker News
6 days ago

Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS

Fortinet released patches for a critical vulnerability in FortiClient EMS, allowing unauthenticated attackers to execute unauthorized commands.
Information security
fromThe Hacker News
5 days ago

Multi-OS Cyberattacks: How SOCs Close a Critical Risk in 3 Steps

Multi-OS attacks complicate SOC operations, leading to delays, fragmented evidence, and increased escalation volume, ultimately allowing attackers more time to operate.
fromDevOps.com
5 days ago

Is Your AI Agent Secure? The DevOps Case for Adversarial QA Testing - DevOps.com

The most dangerous assumption in quality engineering right now is that you can validate an autonomous testing agent the same way you validated a deterministic application. When your systems can reason, adapt, and make decisions on their own, that linear validation model collapses.
Information security
Information security
fromTNW | Insights
1 week ago

KeeperDB brings zero-trust database access to privileged access management

Database credentials are a major attack vector, and KeeperDB integrates access controls into its PAM platform to enhance security.
Information security
fromComputerWeekly.com
1 week ago

Banning routers won't fix what's already broken | Computer Weekly

The FCC's ban on foreign-made routers addresses future procurement, not current security risks, as routers are already vulnerable and widely deployed.
Digital life
fromZDNET
1 month ago

Your Windows PC has a secretly useful backup tool - here's how to access it

Windows includes a hidden built-in Backup tool that can back up files and system images to discs, drives, or network locations but is deprecated.
#windows-security
Information security
fromTheregister
2 weeks ago

Microsoft cracks down on old Windows kernel drivers

Microsoft will stop trusting kernel drivers not through the Windows Hardware Compatibility Program by April 2026 to enhance Windows kernel security.
Information security
fromTheregister
2 weeks ago

Microsoft cracks down on old Windows kernel drivers

Microsoft will stop trusting kernel drivers not through the Windows Hardware Compatibility Program by April 2026 to enhance Windows kernel security.
#ntlm
#ai-security
Information security
fromTechzine Global
2 weeks ago

Microsoft Secures AI Agents with Defender, Entra, and Purview

Microsoft introduces new features to secure AI agents, emphasizing the need for a dedicated security layer for their management and protection.
Information security
fromTechzine Global
2 weeks ago

Microsoft Secures AI Agents with Defender, Entra, and Purview

Microsoft introduces new features to secure AI agents, emphasizing the need for a dedicated security layer for their management and protection.
Tech industry
fromComputerworld
2 months ago

Microsoft releases second out-of-band fix for Windows in a week

January Windows updates caused Outlook and other apps to hang or mishandle files stored on cloud services, prompting Microsoft to release emergency out-of-band fixes.
Artificial intelligence
fromTheregister
2 months ago

Microsoft teases targeted Copilot removal for admins

Admins can remove Microsoft Copilot from managed devices, but removal requires Microsoft 365 Copilot present, non-user-installed app, and no launch in past 28 days.
fromTheregister
2 months ago

Microsoft stays quiet while emergency Windows fixes ramp up

But are things getting worse? According to Register readers, and the company's own release health dashboard, the answer has to be yes. It isn't just you. The frequency of emergency out-of-band releases for the company's operating systems has been rapidly increasing to the point where, for every Patch Tuesday update, there'll likely be at least one out-of-band patch to fix whatever got broken.
Tech industry
#microsoft-intune-security
Information security
fromTechzine Global
3 weeks ago

Major warning: Secure your Microsoft environment

CISA warns organizations to strengthen Microsoft Intune security after attackers exploited the platform in a Stryker cyberattack, gaining administrative access and disrupting healthcare operations.
Information security
fromTheregister
3 weeks ago

Microsoft Intune: Lock it down, warn feds after Stryker

Iran-linked Handala attacked Stryker using compromised Microsoft Intune to wipe devices; CISA urges companies to implement least privilege access controls and follow Microsoft security best practices.
Information security
fromSecurityWeek
3 weeks ago

CISA Warns of Attacks Exploiting Recent SharePoint Vulnerability

Microsoft SharePoint vulnerability CVE-2026-20963, a critical remote code execution flaw, is being exploited in the wild despite Microsoft's assessment indicating exploitation is less likely.
Information security
fromTechzine Global
3 weeks ago

Microsoft is blocking automatic Windows installations via WDS

Microsoft is discontinuing automatic Windows network deployments via WDS and Unattend.xml due to security vulnerability CVE-2026-0386 that allows attackers to execute unauthorized code and steal credentials.
Information security
fromSecurityWeek
4 weeks ago

Critical HPE AOS-CX Vulnerability Allows Admin Password Resets

HPE released patches for a critical vulnerability in Aruba Networking AOS-CX switches that allows remote, unauthenticated attackers to reset administrator passwords and gain full system control.
Information security
fromTechzine Global
1 month ago

Red Access turns any firewall into a full SSE platform

Red Access launches firewall-native SSE that adds Security Service Edge capabilities to existing firewalls without requiring replacement, agents, or browser changes, deploying up to 80 percent faster than traditional SSE platforms.
Information security
fromTheregister
1 month ago

Hotpatching goes default in Windows Autopatch

Windows Autopatch enables hotpatch security updates by default starting May 2026, installing patches without restarts, though administrators can opt out at the tenant or group level.
Information security
fromThe Hacker News
1 month ago

Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices

SAP released security updates for two critical vulnerabilities enabling arbitrary code execution: CVE-2019-17571 in Quotation Management Insurance and CVE-2026-27685 in NetWeaver Enterprise Portal Administration.
fromThe Hacker News
1 month ago

Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days

This month, over half (55%) of all Patch Tuesday CVEs were privilege escalation bugs, and of those, six were rated exploitation more likely across Windows Graphics Component, Windows Accessibility Infrastructure, Windows Kernel, Windows SMB Server, and Winlogon. We know these bugs are typically used by threat actors as part of post-compromise activity, once they get onto systems through other means (social engineering, exploitation of another vulnerability).
Information security
Information security
fromSecurityWeek
1 month ago

Microsoft Patches 83 Vulnerabilities

Microsoft released 83 vulnerability patches in March 2026, including one critical remote code execution flaw and several privilege escalation bugs requiring attention.
Information security
fromTechRepublic
1 month ago

Hackers Pose as IT Staff in Microsoft Teams to Install Malware

Attackers impersonate Microsoft Teams and IT personnel to deliver A0Backdoor malware through malicious MSI installers, using social engineering and DLL sideloading techniques to establish persistent network access.
fromSecurityWeek
1 month ago

Cisco Patches Critical Vulnerabilities in Enterprise Networking Products

This vulnerability is due to an improper system process that is created at boot time. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute a variety of scripts and commands that allow root access to the device.
Information security
Information security
fromSecurityWeek
1 month ago

Vulnerability in MS-Agent AI Framework Can Allow Full System Compromise

CVE-2026-2256 in ModelScope MS-Agent framework allows arbitrary OS command execution through inadequate input sanitization in the Shell tool using regex-based blacklist filtering.
fromInfoWorld
1 month ago

Microsoft warns of jobthemed repo lures targeting developers with multistage backdoors

Multiple repositories followed repeatable naming conventions and project 'family' patterns, enabling targeted searches for additional related repositories that were not directly referenced in observed telemetry but exhibited the same execution and staging behavior.
Information security
#windows-admin-center
fromTheregister
2 months ago

Old Windows quirks help punch through new admin defenses

The issue focuses on how Windows handles these directories for specific user sessions. Because the kernel creates a DOS device object directory on demand, rather than at login, it cannot check whether the user is an admin during the creation process. Unlike UAC, Administrator Protection uses a hidden shadow admin account whose token handle can be returned by the system when calling the NtQueryInformationToken API function.
Information security
#microsoft-patch-tuesday
Information security
fromwww.housingwire.com
2 months ago

Reducing risk: The importance of administrative access responsibilities

Clearly defined and strictly managed administrative access reduces cybersecurity risk while preserving operational efficiency in real estate, title insurance, and mortgage systems.
Information security
fromTheregister
2 months ago

Windows App breaks logins with first 2026 security patch

January 13, 2026 Windows security update causes credential prompt failures in the Windows App, breaking Azure Virtual Desktop and Windows 365 connections.
Information security
fromInfoQ
1 month ago

Building a Least-Privilege AI Agent Gateway for Infrastructure Automation with MCP, OPA, and Ephemeral Runners

Enforce external governance, policy-as-code authorization, observability, and short-lived isolated execution runners to limit AI agents' access and contain the blast radius of autonomous operations.
Information security
fromSecurityWeek
1 month ago

CISA Warns of Exploited SolarWinds, Notepad++, Microsoft Vulnerabilities

CISA warns multiple newly disclosed vulnerabilities in SolarWinds, Notepad++, and Apple have been exploited in the wild and are added to its KEV list.
fromSecurityWeek
1 month ago

6 Actively Exploited Zero-Days Patched by Microsoft With February 2026 Updates

CVE-2026-21510: a Windows SmartScreen and Windows Shell security prompts bypass that can be exploited by convincing the targeted user to open a malicious link or shortcut file. CVE-2026-21514: a vulnerability that allows an attacker to bypass OLE mitigations in Microsoft 365 and Office by tricking the target into opening a malicious Office file. CVE-2026-21513: an Internet Explorer issue that allows an attacker to bypass security controls and potentially execute code by convincing the victim to open a malicious HTML or LNK file.
Information security
Information security
fromTheregister
1 month ago

Microsoft's Valentine's gift to admins: 6 zero-day fixes

Six Microsoft vulnerabilities were exploited as zero-days before February Patch Tuesday, including three publicly disclosed flaws enabling remote code execution and security feature bypasses.
fromSecurityWeek
2 months ago

Access System Flaws Enabled Hackers to Unlock Doors at Major European Firms

Vulnerabilities discovered by researchers in Dormakaba physical access control systems could have allowed hackers to remotely open doors at major organizations. The security holes were discovered by experts at SEC Consult, a cybersecurity consulting firm under Atos-owned Eviden, in Dormakaba's Exos central management software, a hardware access manager, and registration units that enable entry via a keypad, fingerprint reader, or chip card.
Information security
fromThe Hacker News
2 months ago

Password Reuse in Disguise: An Often-Missed Risky Workaround

Near-identical password reuse occurs when users make small, predictable changes to an existing password rather than creating a completely new one. While these changes satisfy formal password rules, they do little to reduce real-world exposure. Here are some classic examples: Adding or changing a number Summer2023! → Summer2024! Appending a character Swapping symbols or capitalization Welcome! → Welcome? AdminPass → adminpass Another common scenario occurs when organizations issue a standard starter password to new employees, and instead of replacing it entirely, users make incremental changes over time to remain compliant.
Information security
fromThe Hacker News
1 month ago

Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days

Of the 59 flaws, five are rated Critical, 52 are rated Important, and two are rated Moderate in severity. Twenty-five of the patched vulnerabilities have been classified as privilege escalation, followed by remote code execution (12), spoofing (7), information disclosure (6), security feature bypass (5), denial-of-service (3), and cross-site scripting (1). It's worth noting that the patches are in addition to three security flaws that Microsoft has addressed in its Edge browser since the release of the January 2026 Patch Tuesday update,
Information security
Information security
fromSecurityWeek
1 month ago

Microsoft to Enable 'Windows Baseline Security' With New Runtime Integrity Safeguards

Windows Baseline Security Mode will enable runtime integrity safeguards by default, allowing only properly signed apps, drivers, and services to run while permitting administrator overrides.
Information security
fromTechRepublic
1 month ago

Microsoft Patches Windows Flaw Causing VPN Disruptions

A patched RasMan vulnerability (CVE-2026-215) allowed local attackers to crash Windows Remote Access Connection Manager, disrupting VPN and remote access services.
Information security
fromTheregister
2 months ago

Phishing attacks abuse SharePoint, target energy orgs

Attackers used SharePoint-based phishing to steal credentials, compromise energy-sector email accounts, and send hundreds of phishing messages from hijacked inboxes.
Information security
fromSecurityWeek
1 month ago

Microsoft Warns of ClickFix Attack Abusing DNS Lookups

Threat actors use a ClickFix variant to trick users into running commands that perform DNS-based second-stage execution and ultimately deploy ModeloRAT.
Information security
fromZDNET
2 months ago

What a Linux root user can do - and 8 ways you should absolutely never use it

The root account has unrestricted system access and should be used cautiously; prefer sudo for safer, temporary elevated privileges.
Information security
fromTechzine Global
2 months ago

BeyondTrust Remote Support has a critical vulnerability

Unauthenticated remote-code-execution vulnerability in BeyondTrust Remote Support and Privileged Remote Access enables full system compromise; affected versions require urgent patching or upgrades.
fromZDNET
1 month ago

Missing emails? Exchange Online is tagging legitimate messages as spam - here's what to do

In a service alert spotted by BleepingComputer, Microsoft revealed that the glitch started on February 5 and has been preventing some Exchange Online users from sending and receiving emails. "Some users' legitimate email messages are being marked as phish and quarantined in Exchange Online," Microsoft said in the service alert. "We've determined that the URLs associated with these email messages are incorrectly marked as phish and quarantined in Exchange Online due to ever-evolving criteria aimed at identifying suspicious email messages, as spam and phishing techniques have become more sophisticated in avoiding detection."
Information security
fromTheregister
1 month ago

CISA gives feds 3 days to patch actively exploited Dell bug

Uncle Sam's cyber defenders have given federal agencies just three days to patch a maximum-severity Dell bug that's been under active exploitation since at least mid-2024. CISA this week added the flaw, tracked as CVE-2026-22769, to its Known Exploited Vulnerabilities catalog, ordering civilian agencies to secure affected systems by February 21 - giving them just three days to get fixes in place.
Information security
Information security
fromTheregister
2 months ago

AI framework flaws put enterprise clouds at risk of takeover

Two Chainlit vulnerabilities enable arbitrary file reads and SSRF attacks, risking exposure of environment variables, credentials, and potential cloud takeover if not patched.
[ Load more ]