Daily Compliance News: May 21, 2025, The I Want You Back Edition
Shout Outs and Rants: Episode 153, The CW 25 Edition
Episode 271 -- Deep Dive into Microsoft's OFAC Settlement for $3 Million
Everything Dynamic Everywhere: Managing a More Collaborative Microsoft 365
Microsoft 365 and the Age of Automation
Compliance Into The Weeds - Antitrust Issues in Microsoft Acquisition of Activision Blizzard
Everything Compliance - Episode 93 - The Activision Blizzard Edition
Microsoft Week on Innovation in Compliance -Legal Compliance for The Future with Alan Gibson
Keeping Up with M365 Software Updates
Efficiently and Defensibly Addressing Microsoft Teams Data
M365 in 5 – Part 7: Teams Audio/Video (A/V) Conferencing
M365 in 5 – Part 6: Teams Channels – The virtual collaboration workspace
M365 in 5 – Part 5: Teams Chats – Modern communications
M365 in 5 – Part 4: Teams – An introduction to collaboration
M365 in 5 – Part 3: OneDrive for Business – Protected personal collaboration
M365 in 5 – Part 2: SharePoint Online – The new file-share environment
M365 in 5 – Part 1: Exchange Online – Not just a mailbox
Episode 104 -- A Deep Dive into the Microsoft FCPA Settlement
This Week in FCPA-Episode 164, week ending July 26, 2019 – the Microsoft and Facebook settle edition
Is the Patent Litigation Boom Coming to an End?
Microsoft has confirmed that vulnerabilities in its on-premises SharePoint Server installations, a network spoofing vulnerability (CVE-202549706), and a remote code execution vulnerability (CVE-2025-49704) are being actively...more
On July 20, 2025, Microsoft and the Cybersecurity and Infrastructure Security Agency (CISA) issued urgent warnings about new, actively exploited vulnerabilities in Microsoft SharePoint Server. These vulnerabilities, known as...more
Microsoft has just disclosed a serious vulnerability in SharePoint (CVE-2025-53770) that allows unauthenticated attackers to remotely execute code in a SharePoint server hosted on-prem – no user interaction required....more
Learn how to enhance your approach to data loss prevention with AI in mind, including what capabilities are essential for your organization and how to deploy Microsoft Purview DLP to address your needs. The information...more
Millions of companies use the Microsoft 365 suite of tools every day to create, communicate, and collaborate, but far fewer have adequately grappled with the legal risks introduced by Copilot, the powerful generative AI...more
Credential-based threats—such as password sprays, token reuse, and low-complexity sign-in attempts—remain a constant operational burden. While these activities are easily detected in most environments, the workflows to fully...more
Legalweek 2025 Session Recap - The widespread interest in AI for users’ personal and professional lives has driven significant demand for tools like Copilot for Microsoft 365. However, the implementation of any AI tool...more
A Microsoft blog post reported that incident response researchers uncovered a remote access trojan in November 2024 (dubbed StilachiRAT) that “demonstrates sophisticated techniques to evade detection, persist in the target...more
Successful Microsoft Purview deployments require more than just technical implementation—they demand strategic planning, cross-functional collaboration, and ongoing optimization. Read about the key steps required to...more
Financially motivated cybercriminals are increasingly targeting Cloud environments in their ransomware and/or extortion attacks. The attack activity of two (2) threat groups in particular – Octo Tempest (AKA Scattered Spider)...more
In today's digital landscape, robust password management is critical to information security. With the increasing complexity of cyber threats, ensuring secure access to sensitive information has become more critical than...more
It is being reported that Black Basta (aptly named) exploited a Microsoft zero-day prior to Microsoft’s release of a patch for the vulnerability back in March....more
Thursday, Microsoft announced its new line of Copilot Plus PCs would launch next week without the anticipated Recall feature. Originally part of Microsoft’s Copilot Plus suite, Recall was designed to take and store...more
A vulnerability in Microsoft SharePoint has been flagged as being actively exploited by CISA. A vulnerability in Microsoft SharePoint is being actively exploited according to CISA’s known exploited vulnerabilities (KEV)...more
Welcome to the third edition of our AI Legal News Summer Roundup! After five class actions were filed between June 28 and July 11 (as reported on in our first edition of this series), on July 21, another class action lawsuit...more
Like it or not, the remote workforce is here to stay. Statistics show that employees say they are more productive working from home, and even before the global pandemic, there had been a 44% growth in the remote workforce...more
On March 22, 2023, the Federal Trade Commission (FTC) announced a request for information (RFI) seeking public comments on business practices in the cloud computing industry. The RFI focuses on three intertwined aspects of...more
Prestige Ransomware Emerges, Targets Ukraine and Poland - A new ransomware variant has emerged in the wild, being used in targeted attacks against the logistics and transportation sectors within Ukraine and Poland. The...more
Microsoft recently issued mitigation steps for vulnerabilities that are being actively exploited by threat actors. Microsoft stated that it is aware that two vulnerabilities are being actively exploited to access users’...more
CYBERSECURITY - Microsoft Issues Emergency Software Update for PrintNightmare Zero Day Vulnerability - Following the release of a U.S. Cybersecurity & Infrastructure Security Agency (US-CERT) Coordination Center...more
CYBERSECURTY - U.S. CISA + Cyber Command Warns of Critical Flaw in VMware - Although a patch has been available by VMware since May 25, 2021, the Department of Homeland Security’s Cybersecurity and Infrastructure...more
The Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) recently released a free tool that will assist organizations with identifying indicators of compromise following threat activity in...more
We often think of phony financial institution emails as a bad actor’s phishing scheme of choice to capture confidential bank account numbers or other private financial information. While those phishing emails certainly do...more
Microsoft Issues Cybersecurity Risk Warning and Offers Help to Hospitals During COVID-19 Crisis - On April 1, 2020, Microsoft issued a specific warning to health care entities alerting them that they are at particular risk...more
On April 1, 2020, Microsoft issued a specific warning to health care entities alerting them that they are at particular risk during the COVID-19 crisis, as threat actors are using the pandemic to take advantage of...more