#MicrosoftSecurity

2026-01-30

It's been a packed 24 hours in the cyber world with critical zero-day vulnerabilities, evolving threat actor tactics, significant data breaches, and shifts in government policy. Let's dive in:

Critical Zero-Days in Ivanti EPMM and SmarterMail ⚠️
- Ivanti has patched two critical code-injection zero-days (CVE-2026-1281, CVE-2026-1340) in its Endpoint Manager Mobile (EPMM) platform, actively exploited to achieve unauthenticated remote code execution.
- These flaws, with CVSS scores of 9.8, allow attackers to execute arbitrary code and access sensitive data like user credentials, device info, and potentially location data. Temporary RPM scripts are available, but a permanent fix is due in Q1 2026.
- SmarterMail also addressed a critical unauthenticated RCE (CVE-2026-24423, CVSS 9.3) in its ConnectToHub API, and a medium-severity NTLM relay vulnerability (CVE-2026-25067) that could lead to credential coercion. Users are urged to update to Build 9511 (for RCE) and Build 9518 (for NTLM relay) immediately.

🤖 Bleeping Computer | bleepingcomputer.com/news/secu
📰 The Hacker News | thehackernews.com/2026/01/two-
📰 The Hacker News | thehackernews.com/2026/01/smar

Evolving Android Malware and Chinese APT Tactics 🛡️
- A new Android malware campaign is leveraging Hugging Face as a trusted repository to distribute thousands of polymorphic APK variants, disguised as a security app called TrustBastion. It exploits Accessibility Services to steal credentials for financial services like Alipay and WeChat.
- China-linked APTs are actively deploying sophisticated malware: "PeckBirdy," a JScript-based C2 framework, is used by both financially motivated cybercrime groups targeting Chinese gambling sites and espionage groups against Asian government entities.
- UAT-8099, another China-linked threat actor, is targeting vulnerable IIS servers in Asia, particularly Thailand and Vietnam, with BadIIS SEO malware. They use web shells, PowerShell, and legitimate tools like GotoHTTP for remote access and persistence, creating hidden user accounts like "admin$" or "mysql$".

🤖 Bleeping Computer | bleepingcomputer.com/news/secu
⚫ Dark Reading | darkreading.com/cyberattacks-d
📰 The Hacker News | thehackernews.com/2026/01/chin

High-Profile Breaches and IP Theft Conviction 🚨
- Coupang, a major Korean e-commerce site, is under police investigation for allegedly obstructing a probe into a data breach affecting 33.7 million customer accounts, with its CEO questioned and a smashed laptop recovered from a river.
- Thousands more Oregon residents are being notified of health data exposure from the TriZetto data breach, which occurred in November 2024 but wasn't discovered until almost a year later, impacting over 700,000 patients across multiple US states.
- A former Google engineer, Linwei Ding, has been convicted of economic espionage and theft of trade secrets for stealing over 2,000 confidential AI-related documents to benefit a China-based startup he founded.

🗞️ The Record | therecord.media/coupang-acting
🕵🏼 The Register | go.theregister.com/feed/www.th
📰 The Hacker News | thehackernews.com/2026/01/ex-g

Broadening Cyber Threats and Law Enforcement Responses 🌍
- A senior Secret Service official highlighted the "staggering" weakness in the Internet Assigned Numbers Authority (IANA) domain registration system, which facilitates phishing and fraudulent advertising due to insufficient identity validation.
- Google, in collaboration with Cloudflare and Lumen, disrupted IPIDEA, a China-based residential proxy network, removing millions of devices used by cybercriminals and espionage groups, though a significant portion remains active.
- Illicit cryptocurrency flows surged to a record $158 billion in 2025, primarily driven by sanctions-linked activity (Russia, Iran, Venezuela), nation-state use, and improved attribution, despite a slight drop in illicit activity's share of total volume.
- A comprehensive analysis of 418 law enforcement actions (2021-mid-2025) reveals that extortion, malware, and hacking are the most targeted criminal acts, with arrests dominating responses and significant public-private collaboration, particularly from US agencies.

🤫 CyberScoop | cyberscoop.com/secret-service-
🤫 CyberScoop | cyberscoop.com/ipidea-proxy-ne
🤖 Bleeping Computer | bleepingcomputer.com/news/secu
📰 The Hacker News | thehackernews.com/2026/01/badg

US Policy Shifts and Microsoft's NTLM Retirement 🏛️
- The White House's OMB rescinded Biden-era mandates for Software Bills of Materials (SBOMs) and software attestation, arguing they prioritised compliance over genuine security, sparking debate among security professionals about the potential impact on software supply chain security.
- CISA faced scrutiny for releasing insider threat guidance shortly after its acting director, Madhu Gottumukkala, reportedly uploaded sensitive documents to a public ChatGPT instance, highlighting a potential disconnect between policy and practice.
- Microsoft announced plans to disable the 30-year-old NTLM authentication protocol by default in future Windows releases, phasing it out in favour of more secure Kerberos-based alternatives due to NTLM's inherent vulnerabilities to relay and pass-the-hash attacks.

⚫ Dark Reading | darkreading.com/application-se
🕵🏼 The Register | go.theregister.com/feed/www.th
🤖 Bleeping Computer | bleepingcomputer.com/news/micr

AI Security and Developer Challenges 💡
- A BellSoft survey indicates nearly half of Java developers prefer delegating container security to vendors of hardened containers, despite security being the most important factor in image choice and 23% experiencing container-related incidents.
- An op-ed argues that the US can win the AI race against China not just through advanced models, but by leveraging its robust private-sector cybersecurity industry, which fosters trust and security through real-world threat exposure and market-driven defence.
- Tenable introduced "Tenable One AI Exposure" to its exposure management portfolio, designed to detect, map, and govern the use of agentic and generative AI platforms across enterprise infrastructure, addressing concerns about shadow AI and data leakage.

🕵🏼 The Register | go.theregister.com/feed/www.th
🤫 CyberScoop | cyberscoop.com/ai-race-china-u
⚫ Dark Reading | darkreading.com/cyber-risk/ten

#CyberSecurity #ThreatIntelligence #ZeroDay #RCE #Vulnerability #Malware #APT #AndroidSecurity #IISSecurity #DataBreach #EconomicEspionage #IPTheft #Cybercrime #LawEnforcement #SBOM #NTLM #MicrosoftSecurity #AISecurity #ContainerSecurity #InfoSec

2026-01-29

Secure your supply chain. Integrate Defender for Cloud with GitHub Advanced Security to catch vulnerabilities at commit time. #DevSecOps #MicrosoftSecurity

2026-01-05

Start 2026 strong with #ZeroTrust! Enforce MFA for every identity, including service accounts. It blocks 99% of credential attacks. #MicrosoftSecurity #Azure

2025-11-24

Kill legacy auth. Disable basic authentication in Exchange Online—attackers love it. aka.ms/DisableLegacyAuth #MicrosoftSecurity #EmailSecurity

2025-11-20

Microsoft is bringing Sysmon natively into Windows 11 & Windows Server 2025 - installable via Optional Features and updated through Windows Update.

Custom configs, advanced filtering, and the familiar event set (proc creation, file creation, tampering, WMI, network activity) all remain.

Docs + new enterprise management features are coming next year.

What’s your take on native Sysmon for enterprise visibility?

#Sysmon #infosec #windows11 #microsoftsecurity #blueteam #cybersecurity #threathunting #endpointsecurity

Microsoft to integrate Sysmon directly into Windows 11, Server 2025
2025-11-04

Microsoft is retiring Defender Application Guard, and now it's time for a security reboot. Discover how layered defenses like ASR rules, WDAC, and Zero Trust are stepping up to keep your data safe in a new era of cyber threats.

thedefendopsdiaries.com/streng

#defenderapplicationguard
#microsoftsecurity
#attackreduction
#zerotrust
#cloudappsecurity

2025-10-24

Overlooked WSUS configurations could be your network's Achilles' heel—hackers can seize SYSTEM-level control with zero user input. Microsoft's rapid patch is out. Is your server safe?

thedefendopsdiaries.com/critic

#wsus
#cve202559287
#windowsserver
#remotecodeexecution
#cybersecurity
#patchmanagement
#networksecurity
#microsoftsecurity
#zeroday

2025-10-23

One click in File Explorer could have given hackers access to your credentials—until Microsoft's new update shut it down. Curious how this simple tweak is tightening Windows security?

thedefendopsdiaries.com/micros

#microsoftsecurity
#ntlmtheft
#windowsupdate
#credentialprotection
#cyberthreats

2025-10-21

🚨 CISA Updates KEV Catalog – 5 New Vulnerabilities Added
Actively exploited vulnerabilities now include Apple, Microsoft SMB Client, Oracle E-Business SSRF, and Kentico Xperience servers.

💡 Timely remediation is essential to protect enterprise networks. KEV Catalog prioritization should be part of your vulnerability management program.

💬 How is your organization implementing KEV patches? Comment & follow TechNadu for continuous cyber alerts.

#CyberSecurity #CISA #KEVCatalog #ZeroDay #PatchManagement #VulnerabilityManagement #MicrosoftSecurity

CISA Adds Five Known Exploited Vulnerabilities to Catalog
2025-10-21

🚨 Microsoft RDP Threat Alert
Daily deployment of new, previously unseen IPs is targeting Microsoft RDP via RD Web Access timing attacks and RDP login enumeration. Over 500,000 unique IPs observed since September 2025.

💡 Static blocking is ineffective - dynamic threat intelligence is now critical for defense.
How is your organization preparing for fast-evolving RDP attacks?
💬 Join the conversation & follow TechNadu for expert cyber insights.

#CyberSecurity #RDP #Botnet #MicrosoftSecurity #IPRotation #GreyNoise #ThreatIntel #InfoSec #TechNadu #CyberDefense #Malware #NetworkSecurity

Threat Actors Deploying New IPs Daily to Attack Microsoft RDP
2025-10-17

ASP.NET Core's worst nightmare just became reality—a flaw so severe it lets attackers bypass your defenses and hijack sessions. Could your server be at risk?

thedefendopsdiaries.com/cve-20

#cve202555315
#aspnetcore
#httprequestsmuggling
#websecurity
#microsoftsecurity

2025-10-14

Microsoft’s October update wasn’t just routine—it shut down 6 zero-day loopholes, with some already in play. And with free Windows 10 updates ending, the pressure is on. Is your system ready?

thedefendopsdiaries.com/micros

#patchtuesday
#zeroday
#windows10
#cybersecurity
#microsoftsecurity

Tom's Hardware Italiatomshw
2025-10-07

🔒 Microsoft aggiorna la sicurezza: bloccati altri bypass dell'account online di Windows! Rendi il tuo cyberspazio più sicuro 🚀

🔗 tomshw.it/hardware/microsoft-b

Matthijs Pontier🏴‍☠️Piraten#1Matthijs85
2025-09-24

Nederlandse Dirk-jan ontdekt cruciaal probleem in beveiliging Microsoft: rtl.nl/nieuws/economie/artikel

"Toegang tot mail, cloudopslag en servers van miljoenen bedrijven!
Ik kon zomaar namens hen handelen.."


Toegang tot alle bestanden
Nederlandse Dirk-jan ontdekt cruciaa
probleem in beveiliging Microsoft
2025-08-25

AI co-pilots like Microsoft Security Copilot are here to reshape how security operations centers handle scale, speed, and complexity. Used well, they cut time-to-meaning, reduce analyst fatigue, and surface higher-value investigations for humans to resolve. Used poorly, they can amplify bias, create automation blind spots, and erode trust.

My blog post will enlighten the topic with some concrete tips.

vasenius.fi/empowering-soc-ana

#SecurityOperationsCenter #SecurityCopilot #MicrosoftSecurity

Paxion CybersecurityPaxionCyber
2025-06-26

⚠️ TeamFiltration, a legitimate pen-test tool, is being used to hack Microsoft Teams, Outlook, and OneDrive.

🧑‍💻 UNK_SneakyStrike targeted 80K+ accounts without phishing, exploiting tokens and OneDrive backdoors.

🛡️ We detect and stop these threats.

2025-06-03

Big Tech Unites to End Hacker Name Chaos with Unified Cyber Glossary.

Microsoft, Google, Crowd Strike, and Palo Alto Networks are building a shared glossary of hacker group names to cut alias confusion and boost global cyber threat coordination.

#CyberSecurity
#HackerGlossary
#ThreatIntel
#MicrosoftSecurity
#GoogleCybersecurity
#CrowdStrike
#PaloAltoNetworks
#APTGroups

Read Full article from here : techi.com/tech-giants-unite-cy

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst