logo
#

Latest news with #SecurityUpdate

Microsoft Warns Businesses About Major Security Threat: What The Company Has Said
Microsoft Warns Businesses About Major Security Threat: What The Company Has Said

News18

time22-07-2025

  • Business
  • News18

Microsoft Warns Businesses About Major Security Threat: What The Company Has Said

Last Updated: Microsoft has warned businesses about a major security risk that can allow systems to be attacked to steal data. Microsoft has issued a major security warning for its business customers about attacks that can directly affect their server systems. The threat is linked to the SharePoint servers running via Microsoft across its enterprise customers. This platform enables organisations to share documents within their network, and leaving them vulnerable could pose major risk for the company and government agencies. The alert from Microsoft was shared on July 19, 2025 and there is a detailed summary of the issue and how to fix the gaps caused by the attack threats. The company's threat post says, 'Microsoft is aware of active attacks targeting on-premises SharePoint Server customers by exploiting vulnerabilities partially addressed by the July Security Update." It seems the security risk is limited to the SharePoint customers at the server end, and those using the cloud version are secure from any possible mishaps. Reports have indicated that Microsoft is worried about the active nature of these attacks that were termed zero-day earlier this week, which means they were unaware about the possible impact of these vulnerabilities and who might be already affected by the issues. Microsoft's own report says the vulnerability impacts major versions of the SharePoint Server 2010 and 2013 editions. 'Customers using SharePoint Subscription Edition should apply the security update provided in CVE-2025-53771 immediately to mitigate the vulnerability," post adds. Urgent Need To Upgrade The most important aspect covered because of these attacks is for companies to immediately invest in upgrading their systems. Microsoft is advising its customers to upgrade to the SharePoint Server 2016, 2019, & SharePoint Subscription Edition that will completely protect them from the latest attacks. The company has a wide range of its business catering to the affected segment, and not using the cloud-based services tells you the situation on ground that Microsoft needs to overhaul before a major catastrophe like the Crowdstrike outage affects its large business model. view comments First Published: July 22, 2025, 07:30 IST Disclaimer: Comments reflect users' views, not News18's. Please keep discussions respectful and constructive. Abusive, defamatory, or illegal comments will be removed. News18 may disable any comment at its discretion. By posting, you agree to our Terms of Use and Privacy Policy.

Microsoft Releases Urgent Patch to Counter Server Attacks: What To Know
Microsoft Releases Urgent Patch to Counter Server Attacks: What To Know

Newsweek

time21-07-2025

  • Business
  • Newsweek

Microsoft Releases Urgent Patch to Counter Server Attacks: What To Know

Based on facts, either observed and verified firsthand by the reporter, or reported and verified from knowledgeable sources. Newsweek AI is in beta. Translations may contain inaccuracies—please refer to the original content. Microsoft has released an emergency security update to address a critical vulnerability in its on-premises SharePoint Server software, following a wave of cyberattacks over the weekend. The attacks, discovered over the weekend, exploit a previously unknown vulnerability in the document-sharing software, prompting immediate action from both Microsoft and federal investigators. Newsweek reached out to Microsoft and the Cybersecurity and Infrastructure Security Agency (CISA) via email for comment. Why It Matters This high-impact breach highlights persistent risks for organizations relying on on-premises SharePoint servers for collaboration and internal document management. Attackers have reportedly bypassed advanced security measures, such as multi-factor authentication (MFA) and single sign-on, gaining privileged access to sensitive U.S. government, educational, health care, and corporate systems. What To Know On Sunday, Microsoft released a series of security patches to address the breach, saying that it was "aware of active attacks targeting on-premises SharePoint Server customers by exploiting vulnerabilities partially addressed by the July Security Update." In a statement on social media, the tech giant said that "Microsoft has released a security update for SharePoint Subscription Edition to mitigate active attacks targeting on-premises servers. SharePoint Online is not affected. Customers should apply the update immediately. We are actively working on updates for SharePoint 2016 and 2019." A Microsoft office in New York City as seen on June 24, 2025. A Microsoft office in New York City as seen on June 24, 2025. Getty Images The vulnerability CVE-2025-53770 enables attackers to execute code and bypass traditional defenses remotely. Microsoft's cloud-based SharePoint Online service remains unaffected by these exploits. Eye Security, a Dutch cybersecurity firm, uncovered the initial compromises after scanning over 8,000 SharePoint servers worldwide, identifying at least 54 organizations, including U.S. federal agencies, banks, and universities, that were breached. The FBI told Newsweek on Sunday that it is aware of the incidents and is working with federal and private-sector partners to address the threat. Who People Are Saying Michael Sikorski, CTO and head of Threat Intelligence for Unit 42 at Palo Alto Networks, told Newsweek: "If you have SharePoint on-prem exposed to the internet, you should assume that you have been compromised at this point. This is a high-severity, high-urgency threat. "We are urging organizations who are running on-prem SharePoint to take action immediately and apply all relevant patches now and as they become available, rotate all cryptographic material, and engage professional incident response." The Cybersecurity and Infrastructure Security Agency said on Sunday: "CISA is aware of active exploitation of a new remote code execution (RCE) vulnerability enabling unauthorized access to on-premise SharePoint servers. While the scope and impact continue to be assessed, the new Common Vulnerabilities and Exposures (CVE), CVE-2025-53770, is a variant of the existing vulnerability CVE-2025-49706 and poses a risk to organizations. "This exploitation activity, publicly reported as "ToolShell," provides unauthenticated access to systems and enables malicious actors to fully access SharePoint content, including file systems and internal configurations, and execute code over the network." What Happens Next Microsoft is continuing to develop patches for the legacy SharePoint 2016 version, and has advised users to disconnect affected servers from the internet if immediate updates are not available or feasible.

Microsoft SharePoint under 'active exploitation,' Homeland Security's CISA says

time21-07-2025

  • Business

Microsoft SharePoint under 'active exploitation,' Homeland Security's CISA says

The Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) has posted an alert saying it is aware of "active exploitation" of a new vulnerability to Microsoft SharePoint "enabling unauthorized access to on-premise SharePoint servers." The exploitation activity "provides unauthenticated access to systems and enables malicious actors to fully access SharePoint content, including file systems and internal configurations, and execute code over the network," the post stated. "The FBI is aware of the matter, and we are working closely with our federal government and private sector partners," the bureau said in a statement. According to a Microsoft customer guidance blog post issued Saturday, "Microsoft is aware of active attacks targeting on-premises SharePoint Server customers by exploiting vulnerabilities partially addressed by the July Security Update." "These vulnerabilities apply to on-premises SharePoint Servers only," the post added and "SharePoint Online in Microsoft 365 is not impacted." A company spokesperson said the company has been "coordinating closely with CISA, DOD Cyber Defense Command, and key cybersecurity partners around the world throughout our response." "While the scope and impact continue to be assessed," CISA Acting Executive Assistant Director for Cybersecurity Chris Butera said in a statement, "the new common vulnerabilities and exposure (CVE), CVE-2025-53770, is a variant of the existing vulnerability CVE-2025-49706 and poses a risk to organizations with on-premise SharePoint servers." CISA was "made aware of the exploitation by a trusted partner and we reached out to Microsoft immediately to take action," the statement said. "Microsoft is responding quickly, and we are working with the company to help notify potentially impacted entities about recommended mitigations." Eye Security, a cybersecurity firm, says it "identified active large-scale exploitation" of the new vulnerability "being used in the wild" on SharePoint servers across the world and discovered "dozens of systems actively compromised," according to a blog post on the firm's website. The breaches "probably" began on the evening of July 18. According to a post by Palo Alto Networks Unit 42, a threat research and security consulting firm, "These flaws allow unauthenticated attackers to access restricted functionality."

UAE issues 'urgent' Google Chrome security alert, asks residents to update browser
UAE issues 'urgent' Google Chrome security alert, asks residents to update browser

Khaleej Times

time29-05-2025

  • General
  • Khaleej Times

UAE issues 'urgent' Google Chrome security alert, asks residents to update browser

The UAE's Cyber Security Council alerted Google Chrome users of a security update on Thursday. Google has released urgent security updates for Google Chrome to address a critical zero-day. The UAE Cyber Security Council has recommended applying the security updates and also circulating this information to subsidiaries and partners. The Cyber ​​Security Council recommended that users update their Chrome browser to the latest version from Google. Google has released Chrome 137.0.7151.55/56 for Windows, Mac, and Linux, as well as Chrome 137.0.7151.51 for iOS. These vulnerabilities, if exploited, could allow remote attackers to execute arbitrary code, corrupt memory, bypass security restrictions, or cause denial of service (DoS). The Council also said that it appreciates the ongoing cooperation towards providing a secure digital system. أصدرذ جÙ�جÙ� Ù�ؤخرÙ�اØ� ذحدÙ�ثاذ Ø£Ù�Ù�Ù�Ø© طارئة Ù�Ù�ذصÙ�Ø­ Ù�رÙ�Ù� Ø� Ù�Ù�عاÙ�جة اÙ�ثذراذ اÙ�Ø£Ù�Ù�Ù�Ø©, Ù�ذا Ù�Ù�صÙ� Ù�جÙ�س اÙ�Ø£Ù�Ù� اÙ�سÙ�براÙ�Ù� بضرÙ�رة ذحدÙ�Ø« Ù�ذصÙ�Ø­ Ù�رÙ�Ù� اÙ�خاص بأجÙ�زذÙ�Ù� Ø¥Ù�Ù� أحدث إصدار Ù�Ù� Ù�بÙ� جÙ�جÙ�. Ù�Ù�إطÙ�اع عÙ�Ù� ذÙ�اصÙ�Ù� اÙ�ثذراذ Ù�رجÙ� Ù�ذابعة اÙ�رابط اÙ�ذاÙ�Ù�: â�¦ — Cyber Security Council (@cscgovae) May 29, 2025 The Council had also alerted Google Chrome users of a security update earlier, after Google released security updates to address multiple vulnerabilities in the Chrome browser. These vulnerabilities could potentially allow attackers to execute malicious code on affected system, the authority had said. The update included five security fixes and users could access the Chrome Security Page for more information.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store