Beyond “Better Together”: Maximize your Microsoft 365 security with Sophos MDR
Sophos MDR and Microsoft 365 aren’t just “better” together, they’re “best” together.
A critical security flaw has been disclosed in NetApp SnapCenter that, if successfully exploited, could allow privilege escalation. SnapCenter is an enterprise-focused software that’s used to manage data protection across applications, databases, virtual machines, and file systems, offering the ability to backup, restore, and clone data resources. The vulnerability, tracked as
The PA News Agency reports: A medical professional who used a patient’s personal data to visit her home with a gift while working as a vaccinator has been struck off the register. Josep Bofill Blanch, who was a registered physiotherapist employed by NHS Grampian in north-east Scotland, met the woman and gave her an injection when…
Sergiu Gatlan reports: The German data protection authority (BfDI) has fined Vodafone GmbH, the telecommunications company’s German subsidiary, €45 million ($51.4 million) for privacy and security violations. “Due to malicious employees in partner agencies who broker contracts to customers on behalf of Vodafone, there had been fraud cases due to fictitious contracts or contract changes at…
Stealer malware no longer just steals passwords. In 2025, it steals live sessions—and attackers are moving faster and more efficiently than ever. While many associate account takeovers with personal services, the real threat is unfolding in the enterprise. Flare’s latest research, The Account and Session Takeover Economy, analyzed over 20 million stealer logs and tracked…
Joshua Bowling reports: For nearly two weeks, Western New Mexico University’s website and digital systems have been held hostage by what officials in internal emails have called the efforts of a “foreign hacking group.” The university has not publicly addressed the severity of the attack, but documentation obtained by Searchlight New Mexico indicates that an…
The threat actor known as Storm-0249 is likely shifting from its role as an initial access broker to adopt a combination of more advanced tactics like domain spoofing, DLL side-loading, and fileless PowerShell execution to facilitate ransomware attacks. “These methods allow them to bypass defenses, infiltrate networks, maintain persistence, and operate undetected, raising serious concerns…