on July 20, 2025 at 7:00 am — CVE-2025-53771 Microsoft SharePoint Server Spoofing Vulnerability
Improper limitation of a pathname to a restricted directory (‘path traversal’) in Microsoft Office SharePoint allows an authorized attacker to perform spoofing over a network.
on July 20, 2025 at 7:00 am — CVE-2025-53770 Microsoft SharePoint Server Remote Code Execution Vulnerability
The security update is avaialble for Microsoft SharePoint Server Subscription Edition. Microsoft strongly encourages customers running this version of SharePoint to install this update as soon as possible.
on July 18, 2025 at 7:00 am — CVE-2025-49747 Azure Machine Learning Elevation of Privilege Vulnerability
Missing authorization in Azure Machine Learning allows an authorized attacker to elevate privileges over a network.
on July 18, 2025 at 7:00 am — CVE-2025-49746 Azure Machine Learning Elevation of Privilege Vulnerability
Improper authorization in Azure Machine Learning allows an authorized attacker to elevate privileges over a network.
on July 18, 2025 at 7:00 am — CVE-2025-47995 Azure Machine Learning Elevation of Privilege Vulnerability
Weak authentication in Azure Machine Learning allows an authorized attacker to elevate privileges over a network.
on July 18, 2025 at 7:00 am — CVE-2025-47158 Azure DevOps Server Elevation of Privilege Vulnerability
Authentication bypass by assumed-immutable data in Azure DevOps allows an unauthorized attacker to elevate privileges over a network.
on July 18, 2025 at 7:00 am — CVE-2025-53762 Microsoft Purview Elevation of Privilege Vulnerability
Permissive list of allowed inputs in Microsoft Purview allows an authorized attacker to elevate privileges over a network.
on July 17, 2025 at 10:00 am — MaaS operation using Emmenhtal and Amadey linked to threats against Ukrainian entities
In April 2025 Cisco Talos identified a Malware-as-a-Service (MaaS) operation that utilized Amadey to deliver payloads. The MaaS operators used fake GitHub accounts to host payloads, tools and Amadey plug-ins, likely as an attempt to bypass web filtering and for ease of use. Several operator tactics, techniques and procedures (TTPs) overlap with a SmokeLoader phishing