Home » security » Page 2
Gemini Deep Research report view with toggles for Gmail, Drive, and Chat sources and a visible consent banner

Gemini in Gmail and Drive: Admin Playbook for a Safe Rollout

Gemini’s Deep Research now taps Gmail, Drive, and Chat when users allow it. Because the agent can fuse internal messages and files with web context, output quality rises along with privacy risk. This guide shows how to roll out safely: set consent norms, restrict high-risk teams, validate audit coverage, and keep DLP and labels active so Deep Research never reads more than policy permits.

Read More
ClickFix phishing page coaching a user to paste a command that steals M365 access

ClickFix Lures Coach Users to Self-Infect and Bypass Filters

ClickFix campaigns scale by coaching users to “fix” access issues with copy-paste commands. After the click, actors steal Microsoft 365 tokens or credentials and, in some cases, drop PureRAT for persistence. Break the flow by enforcing admin-only app consent, requiring phishing-resistant MFA, and blocking browser-to-shell chains. Investigate mailbox rules, token reuse, and OAuth grants whenever ClickFix pages appear in referral logs.

Read More
NVIDIA Blackwell accelerator concept with a compliance banner and a crossed-out China map silhouette

NVIDIA’s China Stance: No Active Talks on Blackwell, What It Is

NVIDIA’s Jensen Huang says there are no active discussions to sell Blackwell chips to China. Because U.S. export controls bind shipments and Beijing restricts foreign accelerators in state-funded data centers, near-term access looks unlikely. This analysis explains what that means for procurement, security, and model roadmaps and how to design for heterogeneous accelerators without betting your budget on rumors.

Read More
Legacy CVEs and misconfigured IIS enable stealth access via msbuild and DCSync

China-Aligned Abuse msbuild, DCSync After Legacy CVE Break-ins

A China-linked crew still breaks in through legacy CVEs Log4j, Struts, Confluence, GoAhead then hides behind scheduled tasks and msbuild.exe to run memory-resident payloads. They probe domain controllers with DCSync, and they target misconfigured IIS by abusing ASP.NET machine keys to deploy TOLLBOOTH with SEO cloaking. Reduce risk by patching edge services, restricting LOLBAS on servers, rotating machine keys, and alerting on replication from non-DC hosts.

Read More