Microsoft, SharePoint and July 8 patch
Digest more
More information has emerged on the ToolShell SharePoint zero-day attacks, including impact, victims, and threat actors.
Security researchers say Microsoft customers should take immediate action to defend against the ongoing cyberattacks, and must assume they have already been compromised.
A cyber-espionage campaign centred on vulnerable Microsoft software now involves the deployment of ransomware.
Microsoft also has issued a patch for a related SharePoint vulnerability — CVE-2025-53771; Microsoft says there are no signs of active attacks on CVE-2025-53771, and that the patch is to provide more robust protections than the update for CVE-2025-49706.
Officials in Indiana and Missouri said technologists remain watchful, but their states so far seem to have avoided compromise. The latter’s Office of Administration credited a layered security approach for helping deflect bad actors.
Hours after Microsoft revealed hacking groups affiliated with the Chinese government have been exploiting a flaw in its SharePoint software, Bloomberg News reports that the National Nuclear Security Administration has also been breached in the attacks.
Microsoft has released a critical patch for a security flaw in its SharePoint software. Hackers actively exploited this vulnerability, targeting businesses and US government agencies. The company issued the fix between July 19 and 20.
A newly discovered vulnerability in Microsoft’s SharePoint platform has spurred a mad frenzy from hackers — leading to breaches of some Microsoft clients.