Microsoft's March 2025 Patch Tuesday includes six actively exploited zero-day vulnerabilities. Learn about the critical vulnerabilities and why immediate updates...more
Microsoft Office
‘Sneaky Log’ Microsoft Spoofing Scheme Sidesteps Two-Factor Security
The phishing-as-a-service kit from Sneaky Log creates fake authentication pages to farm account information, including two-factor security codes.

How to Hide and Handle Zero Values in an Excel Chart
[video src="https://www.techrepublic.com/wp-content/uploads/2018/07/20180719_SupressZeros_Brandon.mp4" poster="https://www.techrepublic.com/wp-content/uploads/2018/07/20180719_SupressZeros_Brandon.mp4"]Editor’s note: In the video, Brandon Vigliarolo walks you through a couple of ways for suppressing 0 values...more

XLoader Malware Variant Targets MacOS Disguised as OfficeNote App
A new variant of malware called XLoader is targeting macOS users. XLoader’s execution, functionalities and distribution are detailed. Image: Sashkin/Adobe...more

Cisco Talos report: Threat actors use known Excel vulnerability
Image: Sashkin/Adobe Stock Microsoft Office files, particularly Excel and Word files, have been targeted by some cybercriminals for a long...more

How you can use Power BI inside Outlook and Office for data storytelling
Image: monticello/Shutterstock What's hot at TechRepublic If you want to drill into your data and understand trends, outliers and the...more