News

Microsoft has pointed the finger at three Chinese nation-state actors for exploiting the SharePoint vulnerabilities, accusing one group of carrying out ransomware attacks. Here's what we know about ...
Threat actors exploit SharePoint flaws to access internal systems, steal sensitive data, and carry out surveillance, ...
Ransomware has officially entered the Microsoft SharePoint exploitation ring. Late Wednesday, in an update to its earlier ...
A cyber-espionage campaign centered on vulnerable versions of Microsoft's server software now involves the deployment of ...
It's not just data theft. A China-based hacking group is using a flaw in vulnerable SharePoint servers to deliver ransomware, ...
Ransomware gangs are on the hunt for organizations that have yet to patch their vulnerable Microsoft SharePoint servers. Why ...
Microsoft 365 Defender now automatically disrupts ransomware attacks, giving business customers — but not consumers, yet — a bit more peace of mind in avoiding ransomware.
Threat actors are now installing a new ransomware called 'DEARCRY' after hacking into Microsoft Exchange servers using the recently disclosed ProxyLogon vulnerabilities.
The rash of ransomware attacks that have plagued companies in recent months highlights the need for Microsoft to do more to help users avoid being hit — and recover quickly if they are.
Windows ransomware protection basics Unbeknownst to many consumer users of Windows, Microsoft offers built-in ransomware protection as part of Windows Defender, found under Virus & Threat Protection.
Microsoft sees ransomware, the natural next step for phishing, as a major growing threat. This is when the hacker hijacks your system, and won't let you back in unless you pay the ransom fee.
Microsoft’s best defense is that XP is very, very old. Released in 2001, XP stopped appearing on most new computers in 2008, and large clients like the NHS had ample warning to switch over ...