Red Team GUI Toolkit for Microsoft 365 Exploitation via Graph API
A red teamer operating under the handle OtterHacker has publicly released M365Pwned, a pair of WinForms GUI tools designed to enumerate, search, and exfiltrate data…
A red teamer operating under the handle OtterHacker has publicly released M365Pwned, a pair of WinForms GUI tools designed to enumerate, search, and exfiltrate data…
If you have been using Signal or WhatsApp for work, you might want to double-check your security settings. On Monday, 9 March 2026, the Netherlands’…
Anthropic has filed a lawsuit to block the Pentagon from placing it on a national security blacklist, escalating the artificial intelligence lab’s high-stakes battle with…
Security awareness training (SAT) is supposed to make companies safer, but too often, it feels like just another box to check. While every SAT vendor…
Hackers contacted employees at financial and healthcare organizations over Microsoft Teams to trick them into granting remote access through Quick Assist and deploy a new piece…
Microsoft has introduced Copilot Cowork, a new AI-powered feature embedded within Microsoft 365 that moves beyond conversational assistance to autonomous task execution. Unlike traditional Copilot…
Russian-backed hackers have launched a global cyber campaign to gain access to Signal and WhatsApp accounts used by officials, military personnel and journalists, two intelligence…
Download the full report The 2026 State of Security report provides comprehensive analysis of each threat domain, threat actor profiles, regional risk assessments, and actionable…
Acknowledgments: Special thanks to John Hammond for his contributions to this investigation and write-up. Update #2: 12/18/25 @ 6pm ET We’ve seen reports from other…
Hackers are increasingly exploiting newly disclosed vulnerabilities in third-party software to gain initial access to cloud environments, with the window for attacks shrinking from weeks…
A new data-stealing malware called BoryptGrab has been quietly spreading across Windows systems through a network of fake GitHub repositories, tricking users into downloading what…
For years, tech companies successfully resisted pressure from child safety advocates to do more to keep kids off their services, claiming technical limitations would make any…