security breaches

AppWizard
July 9, 2025
Activision has removed Call of Duty: WWII from the Microsoft Store and Game Pass due to security breaches affecting players. The game is offline while the publisher investigates reports of hacks experienced by PC users. It remains available on Steam and other consoles. Players have reported significant security threats, including a video from streamer Wrioh demonstrating hacking incidents. The version of the game on Microsoft’s platforms reportedly contained an outdated flaw.
Winsage
July 1, 2025
Microsoft Teams Classic has officially ceased operations, with all backend services disabled and servers shut down. Many organizations delayed their migrations despite prior announcements, leading to user disruptions and increased support tickets. A study by the UK’s Royal Institution of Chartered Surveyors found that over a quarter of UK businesses experienced cyberattacks in the past year, and nearly three-quarters of business leaders anticipate cybersecurity disruptions within the next one to two years. The end of support for Windows 10 is set for October 14, 2025, presenting further challenges for IT teams, particularly in regulated sectors. Organizations face hurdles in migration due to budget constraints, lack of visibility into legacy dependencies, and staff turnover. IT teams must deploy the new Teams client, disable Teams Classic, and ensure clear communication and documentation to mitigate risks.
Winsage
June 26, 2025
Microsoft has launched the Secure Future Initiative (SFI) to strengthen its security against cyber threats following recent breaches. The Windows Resiliency Initiative, part of the SFI, introduced features like Quick Machine Recovery (QMR) and enhanced Administrator protection for consumer users. Microsoft is also integrating existing Windows 11 security features, such as Windows Hello Enhanced Sign-In Security (ESS). A recent update to the Windows Resiliency Initiative was announced, emphasizing the need for accessible information for users.
Tech Optimizer
June 24, 2025
Zero Trust addresses the issue of misplaced trust in cybersecurity, particularly the assumption that files from known senders are safe. This assumption can lead to security breaches, as malware can be hidden in documents from internal employees, vendors, or customers. Familiar interactions often bypass essential security checks, creating vulnerabilities. Security tools may fail to detect modern threats, which can evade traditional defenses. Compromised accounts and infected devices can introduce risks regardless of the sender's identity. To mitigate these risks, Votiro's solution cleanses every file using Content Disarm and Reconstruction (CDR) technology, removing harmful elements while maintaining functionality. Votiro's approach ensures that file security does not disrupt business operations, providing a seamless and efficient solution for organizations.
Winsage
May 29, 2025
October 14, 2025, marks the end of support for Windows 10, meaning devices running this OS will stop receiving security patches and updates. Since the end of 2022, Windows 10 has only received security patches without new features. While it will continue to function, its security will be compromised. Organizations may need to consult IT professionals before relying on unsupported operating systems. It is also advisable to assess older infrastructure that may depend on outdated operating systems. Upgrading to Windows 11, specifically version 24H2, is recommended before the October 2025 deadline, as unsupported operating systems pose significant security risks.
Winsage
May 28, 2025
Windows 10 and Windows 11 users are experiencing a rise in phishing emails that appear to be from Microsoft, according to Action Fraud, the UK's national fraud and cybercrime reporting center. Over 250 users have reported receiving fraudulent messages claiming their devices are infected with malware, often encouraging them to click on malicious links. These emails may look credible, sometimes using legitimate Microsoft addresses. Action Fraud advises users to verify messages directly with organizations using official contact details and warns that legitimate institutions will never request personal information via email. Microsoft also states it does not send unsolicited emails or calls for personal information and recommends downloading software only from official sources.
Tech Optimizer
May 23, 2025
Cloudflare, in collaboration with Microsoft and international law enforcement, has dismantled the infrastructure of LummaC2, an information-stealing malware service. This initiative led to the seizure and blocking of malicious domains and disrupted digital marketplaces used by criminals. Lumma Stealer operates as a subscription service providing threat actors access to a central panel for customized malware builds and stolen data retrieval. The stolen information includes credentials, cryptocurrency wallets, and sensitive data, posing risks of identity theft and financial fraud. Lumma Stealer was first identified on Russian-language crime forums in early 2023 and has since migrated to Telegram for distribution. Its proliferation is facilitated by social engineering campaigns, including deceptive pop-ups and bundled malware in cracked software. Cloudflare implemented measures to block access to Lumma's command and control servers and collaborated with various authorities to prevent the criminals from regaining control. Mitigation strategies for users include restricting unknown scripts, limiting password storage in browsers, and using reputable endpoint protection tools. The operation has significantly hindered Lumma's operations and aims to undermine the infostealer-as-a-service model contributing to cybercrime.
AppWizard
March 31, 2025
Google's AI-driven threat detection and security measures blocked approximately 2.36 million policy-violating applications from being released on the Play Store last year. In February, Google removed hundreds of malicious applications that were infecting devices with adware and malware. Over 50 times more Android malware originates from internet-sideloaded sources compared to those found on the Play Store. Google is expanding its Play Protect feature across all applications and the upcoming Android 15 will introduce live threat detection. Sophos warned about PJobRAT malware, which can steal SMS messages, contacts, and files from infected Android devices. Experts advise against sideloading apps unless their legitimacy and security are certain.
Search