Agregátor RSS

Microsoft Power Automate: How to get started

Computerworld.com [Hacking News] - 19 Březen, 2025 - 13:25

When you receive an email with an invoice, wouldn’t it be nice if it automatically saved the file to your finance folder, logged the amount in your tracking spreadsheet, and notified your manager? That’s exactly what Microsoft Power Automate can do, along with a host of other automated actions.

Like its competitors IFTTT and Zapier, Power Automate allows business professionals of all stripes to create automated workflows involving a series of tasks across certain applications or services — even those from different vendors — that send notifications, ask for and offer approvals, and handle rote tasks automatically, with no coding required. The automation tool is part of what Microsoft calls its Power Platform, a suite of AI-enabled and AI-enhanced process automation tools.

Power Automate taps into enterprise apps and services via components called “connectors.” Microsoft offers more than 1,000 prebuilt, certified connectors, and you can build custom connectors to other apps.

While anyone with a Microsoft account can use Power Automate for free on a limited basis, business users will need a paid subscription to access key connectors and tools. Power Automate is included with most Microsoft 365 enterprise plans, so you may well already have access to it; if not, separate Power Automate plans start at $15 per user per month.

Here’s what you need to know to get up and running with Power Automate.

In this article:

  • Understanding the basics
  • Getting started
  • Your first automation: Email filing
  • Adding AI power: Copilot and AI Builder
  • Making your flows reliable
  • The last word
Understanding the basics

Often with a service like Power Automate, you get a bit of the writer’s “staring at a blank page” syndrome, where you don’t even know where to begin. What’s even possible? Fortunately, Microsoft offers templates that show a bunch of a different possibilities: surf over to its templates gallery to get a sense of what you can do, from saving email attachments in a SharePoint library to recording form responses from a Google Sheet (yes, really!).

But the templates are just a starting point. You’ll want to write something customized for your own workflows, I’m sure. Before we dive into building automations (or “flows” as they’re called in Power Automate), let’s get comfortable with what we’re working with.

Think of Power Automate as your personal digital assistant that can work across your applications. There are three main types of automation you can create:

  • Cloud flows are like having an assistant in the cloud, constantly watching for things to happen in your online apps like Outlook, SharePoint, or Teams. There are actually three types of these cloud flows: automated, instant, and scheduled, which do about what you think they’d do.
  • Desktop flows are like having someone sit at your computer, clicking and typing for you in desktop applications like Excel or specialized business software.
  • Business process flows are more like having a guide that walks you through complex procedures step by step, ensuring nothing gets missed.

Each type serves a different purpose, and you’ll likely use a combination of them as you become more comfortable with automation.

Getting started

Let me walk you through setting up Power Automate for the first time. The process is straightforward, but there are a few important details to pay attention to.

First, open your web browser and go to microsoft365.com. If you’re not already signed in, use your work email and password. You’ll know you’re in the right place when you see the Microsoft 365 app launcher (a square icon with nine dots) in the top left corner.

Click the app launcher; this opens a panel showing all your available Microsoft 365 apps. Don’t worry if you don’t see Power Automate right away — scroll down and look for it. The icon looks like a multicolored right arrow. If you don’t see it, use the search bar at the top of the app launcher pane.

Click on Power Automate to open it. The first time you open it, you might see a brief tutorial. Feel free to go through it or click Skip if you prefer to dive right in. When the whole app opens, you’ll see a welcome screen with templates and suggestions.

Power Automate’s Home screen is brimming with suggested flows and tutorials.

Jonathan Hassell / Foundry

Take a moment to look at the left navigation bar: this is where you’ll find your flows, templates, and connections later.

Your first automation: Email filing

You probably noticed in the previous screenshot that Copilot, Microsoft’s generative AI tool, is now integrated with Power Automate. That means you can describe an automation you’d like to create in natural language, and Power Automate will generate a flow based on your prompt. But Copilot isn’t available to all Power Automate users, and it’s helpful for everyone to know how to build a flow from scratch; that’ll make it easier to adjust and improve any AI-generated flows.

So, let’s start with something everyone needs: automatically organizing emails. Let’s assume you’re in charge of receiving applications for something at work — maybe it is an internship, or perhaps you’re running a scholarship program and you are managing the entries. I’ll show you how to create a flow that stores files attached to emails in SharePoint and tracks them in a neat, centralized list. This is a perfect first flow because it’s both useful and teaches several important concepts.

From the Power Automate home page, look for the button in the left navigation bar labeled Create and click it. (You can alternatively click My flows first, then look for the New flow button up top.)

You’ll see several options. For this flow, we want the whole automation to run without us having to start it, so select Automated cloud flow.

Choose Automated cloud flow on the left for your first flow.

Jonathan Hassell / Foundry

This opens the flow creation wizard. Name your flow Scholarship Applications.

Next, you choose a trigger, which is the event that will start your flow. In the trigger search box, type Outlook new email and select When a new email arrives. You will be able to add conditions to make it more specific later.

Name the new flow and choose a trigger.

Jonathan Hassell / Foundry

Click Create to continue. The trigger appears in the middle of a blank canvas in Power Automate.

Next, we add steps. The flow executes one step at a time, and each step is an action that the flow will perform once triggered. But first we need to configure the start of our sequence and add a couple of parameters so we can nail down which types of emails we’re looking for and what about them we want Power Automate to do.

Click the When a new email arrives trigger and look at the parameters tab. You’ll want to add four important advanced parameters, which you’ll be able to see in the window by clicking Show all.

Adding advanced parameters to the new email trigger.

Jonathan Hassell / Foundry

You want to add the following:

  • Include Attachments: set to Yes
  • Subject Filter: type in Scholarship application
  • Folder: set to Inbox (click the folder icon and select Inbox from the pop-up menu)

Then just click back over on the canvas area to save those changes.

Let’s keep adding actions. Click the + sign below your “When a new email arrives” trigger, and the “Add an action” pane appears.

Let’s add our new action by searching for Create item. It will have the SharePoint logo attached to it to let you know it’s related to SharePoint Online. Click on Create item to add it to your canvas.

srcset="https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-05-add-action-screen.png?quality=50&strip=all 936w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-05-add-action-screen.png?resize=300%2C188&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-05-add-action-screen.png?resize=768%2C481&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-05-add-action-screen.png?resize=268%2C168&quality=50&strip=all 268w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-05-add-action-screen.png?resize=134%2C84&quality=50&strip=all 134w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-05-add-action-screen.png?resize=767%2C480&quality=50&strip=all 767w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-05-add-action-screen.png?resize=575%2C360&quality=50&strip=all 575w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-05-add-action-screen.png?resize=399%2C250&quality=50&strip=all 399w" width="936" height="586" sizes="(max-width: 936px) 100vw, 936px">

Adding an action after the trigger will tell the flow what to do next.

Jonathan Hassell / Foundry

Now you can configure the action a little more granularly. You need to give the SharePoint Create item action a couple of parameters, because otherwise it won’t know what SharePoint site you want to use for this flow, nor will it know which list to use and augment as new emails and attachments arrive.

srcset="https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-06-configuring-create-item-action.png?quality=50&strip=all 936w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-06-configuring-create-item-action.png?resize=300%2C135&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-06-configuring-create-item-action.png?resize=768%2C345&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-06-configuring-create-item-action.png?resize=150%2C67&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-06-configuring-create-item-action.png?resize=854%2C383&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-06-configuring-create-item-action.png?resize=640%2C287&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-06-configuring-create-item-action.png?resize=444%2C199&quality=50&strip=all 444w" width="936" height="420" sizes="(max-width: 936px) 100vw, 936px">

Configuring the SharePoint action item.

Jonathan Hassell / Foundry

Go ahead and select the SharePoint site you want to use, and then select the list you want for this flow. You might need to go over to your SharePoint site first and create a new list for use with this flow; once you do, it should appear in a drop-down list automatically when you click the List Name field. (It may take a few minutes to show up.) You’ll also want to add a text column in your SharePoint list called “Message Content” — this is where the automation will store the body of the email message for you.

You’ll also want to add a couple of advanced parameters to your Create item action:

  • Click Show all to show the choices.
  • Under Limit Columns by View, select All Items.
  • Under Title, type / (slash) and select Insert dynamic content from the pop-up menu. On the pane that appears to the right, select From under “When a new email arrives.”
  • Under Message Content, type / and select Insert dynamic content, then select either Body or Body Preview under the Outlook “When a new email arrives” list in the pane on the right. (Body Preview might not be immediately visible. To find it, type body in the search box up top and it will appear among the options.)
  • Under “Content type Id,” select Item.

Setting up advanced parameters of the SharePoint action item.

Jonathan Hassell / Foundry

Click the canvas to close the parameters screen and save your changes.

Next, we need to add a condition. A condition affects the behavior of an action when another factor is true or false. In this case, we want the condition to say that the next two actions have output from the previous action applied to them — specifically, we want the attachment from the new email received to be applied to each of our next two subsequent actions.

Click the + sign under the Create item action. On the “Add an action” screen, search for apply to each and then click the Apply to each option that comes up under Control.

Adding an “Apply to each” control.

Jonathan Hassell / Foundry

In the “Select an output from previous steps” field, type / and select Insert dynamic content, then select Attachments to the right. This tells Power Automate to use the attachment for each of the next actions it’s going to take.

Attaching the attachment to the next actions.

Jonathan Hassell / Foundry

Click on the canvas to save the “Apply to each” control. At this point, your flow should look like the figure below.

srcset="https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-10-partially-built-flow.png?quality=50&strip=all 614w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-10-partially-built-flow.png?resize=243%2C300&quality=50&strip=all 243w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-10-partially-built-flow.png?resize=565%2C697&quality=50&strip=all 565w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-10-partially-built-flow.png?resize=136%2C168&quality=50&strip=all 136w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-10-partially-built-flow.png?resize=68%2C84&quality=50&strip=all 68w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-10-partially-built-flow.png?resize=389%2C480&quality=50&strip=all 389w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-10-partially-built-flow.png?resize=292%2C360&quality=50&strip=all 292w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-10-partially-built-flow.png?resize=203%2C250&quality=50&strip=all 203w" width="614" height="757" sizes="(max-width: 614px) 100vw, 614px">

Our flow now has a trigger, an action, and a condition.

Jonathan Hassell / Foundry

Next, click the + sign below the “Apply to each” action and add another action. (This ought to be a pretty familiar routine for you at this point.)

Here, we need to get the attachment — but we need to use the Outlook “Get Attachment” and NOT the SharePoint “Get attachments.” This is a key distinction. So when you search for get attachment, make sure to pick the one in the Outlook subsection.

Then, in the parameters section, hit / and choose Insert dynamic content in each field, and add Message Id to the Message Id field and Attachments Attachment ID to the “Attachement [sic] Id” field. Both of these items are under the Outlook “When a new email arrives” list in the pane that appears on the right, but they might not be immediately visible. To find them, type the first few letters of each in the search box up top and choose the item from the list that appears.

Filling out the parameters for the Get Attachment action.

Jonathan Hassell / Foundry

Click back on the canvas when you’re done to save your changes.

Now, for the final action, click the plus sign below the Get Attachment item, search for add attachment, and choose Add attachment from the SharePoint list. Here, you need to add parameters again, which you should be getting used to as well. You’ll want to add:

  • Site Address: pick your SharePoint site.
  • List Name: pick the SharePoint list.
  • Id: hit the / key, choose dynamic content, and select ID from the SharePoint list.
  • File Name: hit the / key, choose dynamic content, and then choose Attachments Name from the Outlook list.
  • File Content: hit the / key, choose dynamic content, and then choose either Content Bytes or Attachments Content from the Outlook list.

Filling in the parameters for the “Add attachment” action.

Jonathan Hassell / Foundry

Finally, click Save in the top right of the overall Power Automate window to keep the flow saved in your account. The final flow should look like this:

srcset="https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-13-complete-flow.png?quality=50&strip=all 629w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-13-complete-flow.png?resize=212%2C300&quality=50&strip=all 212w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-13-complete-flow.png?resize=493%2C697&quality=50&strip=all 493w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-13-complete-flow.png?resize=119%2C168&quality=50&strip=all 119w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-13-complete-flow.png?resize=59%2C84&quality=50&strip=all 59w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-13-complete-flow.png?resize=340%2C480&quality=50&strip=all 340w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-13-complete-flow.png?resize=255%2C360&quality=50&strip=all 255w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-13-complete-flow.png?resize=177%2C250&quality=50&strip=all 177w" width="629" height="889" sizes="(max-width: 629px) 100vw, 629px">

Our first flow is complete!

Jonathan Hassell / Foundry

Your flow is now ready to test. Use the Test button to try it out. You’ll be asked how you want to test — select Manual, and then send yourself an email with an attachment and put “scholarship application” in the subject line. The flow will report back to you onscreen and show you how long it took to process and what happened at each step.

Note: you may receive errors about a duplicate filename. This relates to the fact we’re not trying to rename individual attachment names when we save them into SharePoint, so if you get a bunch of PDFs from different individuals all called “application” or something similar, Power Automate is telling you the names are duplicated and it isn’t renaming them. This is fine for our purposes, since we are saving the attachments to individual list items, so we’ll always know who they’re from regardless of the filename.

Other errors may result from how your specific Microsoft 365 tenant is configured, but you can often find a workaround. For example, using the Body item in the Message Content field in this flow works fine in my tenant, but when my editor tested it in her tenant, the flow failed, flagging ‘item/MessageContent’ as the source of the error. When she substituted Body Preview in that field, the flow ran flawlessly. So if you hit an error when you start building your own flows, it’s worth looking for a similar item you can substitute.

You’ll know the flow is working when you get green arrows at each step. You can also head over to your SharePoint list, and you should see your message added to the list. The email address of the sender will be in the first column, the message body in the second, and then when you click the individual item, you’ll see the attachments listed there — just click on them to open them up.

Viewing the final result of the automation in SharePoint.

Jonathan Hassell / Foundry

Voila! You’ve just made your first flow and organized a bunch of stuff out of your inbox into a single place where you can share the load with co-workers.

Adding AI power: Copilot and AI Builder

Now let’s make things really interesting by adding artificial intelligence to your flows. This is where automation becomes truly powerful, handling tasks that traditionally required human review.

In this example, let’s ask Copilot to create a flow that automatically processes invoices using AI Builder, a Power Platform feature that creates AI models that automate your business processes. What’s cool about this example is that you’re going to build it simply by describing what you want in natural language, and as part of the resulting flow, Power Automate will integrate AI Builder actions, which use generative AI to review and extract information from existing data and then do something with it.

Note: You’ll need an AI Builder credit allocation or a premium Power Automate license to work with this section.

Create a new flow in Power Automate, and then click Describe it to design it. You’ll get the following screen as a result:

Type in natural language to have Copilot generate a workflow based on your prompt.

Jonathan Hassell / Foundry

Now, in the large box in the center of the screen, just describe the flow you want to create. I’ll give you some language here, which you can either cut and paste yourself into the wizard, or you can change any part of it you like simply by customizing the prompt.

Example: When a new invoice file is created in SharePoint, I want to use AI Builder to extract information from the invoices. Specifically, I want to extract the invoice number (highly recommended), date, total amount, vendor information, and line items (if needed). Once that information has been extracted, I want the information to be added to a list in SharePoint, with the AI-extracted fields mapped to list columns, and also including the processing date and status. I also want to send an email to accounting to notify them of the presence of the invoice, and that email should include extracted data in the email body, have the original invoice file attached, and should also have links to the SharePoint entry. I also want some error handling to check if AI extraction succeeded, and if it didn’t, I want an email to notify me of the failure and also to create a task for manual review.

Once you’ve got the prompt set, click the arrow at the bottom right of the prompt window to enter it. Depending on how you customized your prompt, you’ll get something like the following flowchart, reflecting Power Automate’s interpretation of your prompt:

You can take an AI-generated flow and then expand and fine-tune it.


Jonathan Hassell / Foundry

That’s it! You can click Next below the suggested flow and then click each action as we did before to configure the specific SharePoint libraries, lists, and files involved as well as the email contents and bodies.

Making your flows reliable

Reliability is the cornerstone of successful automation. While creating flows is exciting, ensuring that they continue to work flawlessly is what separates effective automation from frustrating setbacks. Let me walk you through how to build robust, dependable flows that you can trust.

First, think about error handling as you build your flow. After each major action, take a moment to consider what might go wrong. Maybe an email won’t send, a file won’t upload, or data won’t process correctly. These potential failure points need safeguards.

This is where Run after settings become your best friend. You can create an action that responds to what happens during a previous step in the sequence: when the step is successful, when it fails, when it’s skipped, when it times out, or some combination of the above. Think of this as your flow’s safety net.

For example, you could set up an action that sends you an email notification if a previous action fails, is skipped, or times out. Click the + sign after an action to add a new step. Search for and select Send me an email notification. Type in a subject line for the notification (which could include the Subject line from the original email, via the / key, dynamic content pane) and some body text indicating that the flow did not complete successfully.

Next, right-click the new action in the flow and select Run after from the pop-up menu. The action’s pane opens to the Settings tab. Scroll down to the “Run after” section. You’ll see the name of the action immediately above it in the flow. Click that action to expand it, then check Has timed out, Is skipped, and Has failed. Uncheck Is successful.

If you like, you can add other previous actions to this list by clicking Select actions and selecting the actions you want, then expanding and checking/unchecking the status options under each action. In this way, you can set up a single “Run after” step for all the previous actions in a flow, or you can create different “Run after” steps for different actions in the flow.

srcset="https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-17-run-after-actions.png?quality=50&strip=all 936w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-17-run-after-actions.png?resize=300%2C145&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-17-run-after-actions.png?resize=768%2C371&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-17-run-after-actions.png?resize=150%2C72&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-17-run-after-actions.png?resize=854%2C412&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-17-run-after-actions.png?resize=640%2C309&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/03/power-automate-17-run-after-actions.png?resize=444%2C214&quality=50&strip=all 444w" width="936" height="452" sizes="(max-width: 936px) 100vw, 936px">

Setting up ‘Run after’ actions and options.

Jonathan Hassell / Foundry

By setting up “Run after” responses, you’ll be prepared when something does go wrong. Set up notification actions to alert you immediately if a step fails. Create incident tickets so your team can track issues. Keep a log of errors in a spreadsheet for pattern analysis. And don’t forget about retry logic — sometimes a second attempt is all that’s needed to succeed.

Parallel branches are another powerful tool for reliability. By clicking the + symbol between steps and choosing Add parallel branch, you can create simultaneous operations. This is perfect for running independent processes, maintaining backup procedures, or sending out secondary notifications. Think of it as having multiple backup plans running simultaneously.

Finally, let’s talk about monitoring — your early warning system for potential issues. Create a daily monitoring flow that runs automatically. Have it check your flow history and look for any failures. Set it up to send you a daily digest summarizing what’s working and what needs attention. Include success rates so you can spot trends before they become problems.

Your monitoring system should also include smart alerts. Set up notifications for critical failures that need immediate attention. Configure warnings when performance starts to slip. Track usage statistics to ensure you’re making the most of your automation resources.

Remember, reliability isn’t about preventing every possible problem — it’s about having systems in place to catch issues early and resolve them quickly. With these practices in place, you can build flows that don’t just work today but continue working reliably long into the future.

The last word

Microsoft Power Automate provides a service like Zapier and IFTTT that is well integrated with both Microsoft 365 and many other popular cloud services used by individuals and businesses alike. While I’m not exhaustively comparing Power Automate to IFTTT and Zapier, Microsoft shops and especially organizations already in bed with Microsoft 365 may find integrating flows into their daily work easier and more user-friendly.

Whatever the situation, using flows can mean the difference between forgetting subtle but critical details in business workflows and having all of your bases covered.

This article was originally published in October 2019 and updated in March 2025.

Kategorie: Hacking & Security

ClearFake Infects 9,300 Sites, Uses Fake reCAPTCHA and Turnstile to Spread Info-Stealers

The Hacker News - 19 Březen, 2025 - 12:59
The threat actors behind the ClearFake campaign are using fake reCAPTCHA or Cloudflare Turnstile verifications as lures to trick users into downloading malware such as Lumma Stealer and Vidar Stealer. ClearFake, first highlighted in July 2023, is the name given to a threat activity cluster that employs fake web browser update baits on compromised WordPress as a malware distribution vector. The
Kategorie: Hacking & Security

ClearFake Infects 9,300 Sites, Uses Fake reCAPTCHA and Turnstile to Spread Info-Stealers

The Hacker News - 19 Březen, 2025 - 12:59
The threat actors behind the ClearFake campaign are using fake reCAPTCHA or Cloudflare Turnstile verifications as lures to trick users into downloading malware such as Lumma Stealer and Vidar Stealer. ClearFake, first highlighted in July 2023, is the name given to a threat activity cluster that employs fake web browser update baits on compromised WordPress as a malware distribution vector. The Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Amerika hlásí nebezpečný kmen chřipky H7N9. Má smrtnost téměř 40 % a pandemický potenciál

Živě.cz - 19 Březen, 2025 - 12:45
Američti hygienici zaznamenali vysoce patogenní kmen chřipky H7N9 – první případ od roku 2017. Nákaza se obejvila počátkem března na farmě v Mississippi a cena byla krutá, odneslo to totiž 47 654 kuřat. Není ale divu, virus je totiž pro člověka mimořádně nebezpečný. Od roku 2013, kdy jsme jej ...
Kategorie: IT News

5 Identity Threat Detection & Response Must-Haves for Super SaaS Security

The Hacker News - 19 Březen, 2025 - 12:30
Identity-based attacks are on the rise. Attackers are targeting identities with compromised credentials, hijacked authentication methods, and misused privileges. While many threat detection solutions focus on cloud, endpoint, and network threats, they overlook the unique risks posed by SaaS identity ecosystems. This blind spot is wreaking havoc on heavily SaaS-reliant organizations big and small
Kategorie: Hacking & Security

5 Identity Threat Detection & Response Must-Haves for Super SaaS Security

The Hacker News - 19 Březen, 2025 - 12:30
Identity-based attacks are on the rise. Attackers are targeting identities with compromised credentials, hijacked authentication methods, and misused privileges. While many threat detection solutions focus on cloud, endpoint, and network threats, they overlook the unique risks posed by SaaS identity ecosystems. This blind spot is wreaking havoc on heavily SaaS-reliant organizations big and [email protected]
Kategorie: Hacking & Security

10 free upgrades for built-in Windows apps

Computerworld.com [Hacking News] - 19 Březen, 2025 - 12:00

Windows comes loaded with a lot of applications, but to be honest, they aren’t all the best. There are better tools out there, and you don’t have to spend any money to get them. 

These are must-have applications I always find myself installing on any new PC –— they’re all free, open source, and will instantly upgrade any Windows experience. Even better, they can boost your productivity at work or just streamline the way you use your PC at home.

Each of these is also lightweight and bloatware-free: No annoying features that get in your way, no ads bothering you, and no heavy application grinding away slowly while you wait for it to open — just a collection of useful, community-created tools that respect you and do their jobs well. Now, this is what PC computing was meant to be.

Want more useful Windows apps and PC-related tips? Sign up for my free Windows Intelligence newsletter. Plus, I’ll send you free Windows Field Guide downloads as a bonus when you sign up!

1. Everything

Everything is the best file-search tool on Windows, hands down. Unlike the built-in file search feature in the Start menu or File Explorer, Everything finds, well, everything, in an instant. And while those search results are just for file names, it’s still an incredibly fast and lightweight way to find anything on your PC. I find it absolutely indispensable.

Everything is the best Windows file search tool — bar none.


Chris Hoffman/IDG

2. PowerToys (especially PowerToys Run)

Microsoft PowerToys is an incredible collection of tools I recommend to everyone. There are so many useful PowerToys in this package, and many of them feel like upgrades to built-in Windows experiences — like the “Advanced Paste” tool that lets you convert text you copy from Microsoft Word to Markdown formatting as you paste it to FancyZones (which is basically the Windows “Snap” feature on steroids).

But the best upgrade in the package just might be PowerToys Run. It’s an alternate launcher for Windows — you could use it instead of the Start menu, pressing a key combination (like Windows+Space) to open it.

And, unlike the Start menu, PowerToys Run actually respects your choice of default web browser and search engine, rather than forcing you to use Bing and Edge. That’s reason enough to use it, though it can also do so many other things — such as finding notes in your OneNote notebooks, switching to windows by their name, searching your browser history, and more.

PowerToys Run is the launcher Windows should include.

Chris Hoffman/IDG

3. Open-Shell (but Start11 is more polished)

Don’t like the standard Windows Start menu? Open-Shell is a completely free, open-source replacement that will work well on both Windows 10 and Windows 11.

That said, Open-Shell isn’t the most feature-filled application. Start11 is definitely the best Start menu replacement — if you’re willing to spend $10 to $15. (It’s the one application I’m mentioning here that isn’t open source, but it’s inexpensive and very polished.)

Whichever option you choose, you can customize and personalize your Start menu — and you won’t see ads or forced changes as Microsoft keeps updating Windows and tweaking the menu. It’s a great way to make Windows 11 behave more like Windows 10, too.

4. EarTrumpet

Do you find yourself adjusting the volume of individual apps? I do — especially when participating in online meetings. Windows has this functionality, but it takes a few clicks and some scrolling to find. 

EarTrumpet makes it much easier. After installing it, you’ll get a convenient system tray icon where you can access application volume sliders in just a single click. Simple.

EarTrumpet lets you control application volumes in a snap.


Chris Hoffman/IDG

5. ShareX (or Greenshot for quick screenshots)

The Windows Snipping Tool is getting pretty good, especially on Windows 11, where it also has built-in screen recording features. But ShareX is still more powerful — and it also brings easy screen recording to Windows 10.

ShareX is packed with useful features. It can take a scrolling screenshot of a document, or record a video and save it as an animated GIF. It lets you annotate images — and you can even configure it to automatically upload the images you capture to a server when you’re done. It’s a serious power-user tool for capturing screenshots.

Greenshot, another classic screenshot tool, is still a great pick for quick screenshots. However, it’s no longer actively updated like ShareX.

6. Sumatra PDF

Sumatra PDF is an incredibly lightweight app for viewing PDF files. It launches with lightning fast speed, and it’s a nice minimal tool. It doesn’t include the serious security features Adobe uses to “sandbox” PDF code, but it doesn’t need to. Instead, Sumatra PDF stays secure by refusing to support scripting and other advanced document features that make PDFs more like web pages than traditional documents.

In other words: If you want to complete an interactive government form with built-in code, you’ll want another PDF reader. But if you just want to read a PDF document the old-fashioned way? Sumatra PDF is perfect — and fast.

Sumatra PDF helps you avoid those PDFs getting lost in a pile of browsers, too. It can even read eBook files!

For simple and minimal document viewing, Sumatra PDF is the best.

Chris Hoffman/IDG

7. NanaZip (or 7-Zip)

7-Zip is a classic free file archiver tool — a nag-free alternative to WinRAR and WinZip. It can open nearly anything you can throw at it, including RAR files, 7Z files, and TAR files. But 7-Zip is getting a little long in the tooth, and it shows — the interface just feels outdated.

That’s one reason why I prefer NanaZip, which is based on the same underlying 7-Zip code, but offers a more modern interface that feels at home on the latest version of Windows. More importantly, NanaZip automatically updates itself, unlike 7-Zip, ensuring you’ll always have the latest security patches installed without micromanagement.

8. Notepad++

The classic Notepad application is much too basic. On Windows 11, it’s more powerful with features such as tabs — but it also asks you to sign in with your Microsoft account. It’s weird.

Notepad++ is a major upgrade. This lightweight text editor has tabs — even on Windows 10 — and it sports syntax highlighting for programming and scripting. It’s useful even if you just need to tweak HTML regularly, like I do, and the Find and Replace feature works well. Plain and simple, it’s packed with useful features that will come in handy for when you need to work with plain-text files.

Notepad++ is the best plain-text editor for Windows PCs.

Chris Hoffman/IDG

9. Paint.NET

Microsoft is making Paint more powerful, but if I am being honest, it is starting to feel like an AI image generation playground. Paint.NET, on the other hand, is an incredible tool and a secret weapon I’ve used my entire career: a completely free, easy, and lightweight way to quickly edit images and screenshots.

Paint.NET is packed with features that Paint doesn’t have, and it feels more like a tool for getting image work done. 

10. VLC media player (and MusicBee)

Microsoft’s bundled Media Player app is fine, but VLC media player is even better. It can play nearly any type of video or audio file you throw at it — no configuration necessary. It’s also jam-packed with useful features, but you don’t have to use them. Out of the box, it’s just a simple, practical media player.

And if you still have a local music library? MusicBee is the best library-style player for managing that MP3 collection.

More classic Windows-tweaking apps

There is no need to settle for a PC that doesn’t work exactly how you want it — sometimes, all you need to take your PC to the next level is knowing where to look for the right apps. For more ways to improve your Windows experience, check out this guide on the easiest way to install apps on a new Windows PC.

Want even more Windows productivity and tweaking tips? Sign up for my free Windows Intelligence newsletter. I’ll send you three new things to try each Friday. Plus, you’ll get free copies of Paul Thurrott’s Windows Field Guides as a special welcome gift.

Kategorie: Hacking & Security

Vivaldi 7.2 načítá stránky až 2× rychleji. Svižnější a přesnější je také adresní řádek

Živě.cz - 19 Březen, 2025 - 11:45
Oživeno 18. března 2025 | Vivaldi 7.2 načítá stránky výrazně rychleji, tvrdí výrobce. V některých případech dokonce můžete pozorovat dvojnásobné zrychlení . Podařilo se to díky optimalizaci obsluhy připojení. Adresní řádek je rychlejší a přesnější . Při psaní by se tedy měl lépe trefovat do toho, ...
Kategorie: IT News

Huang ohlásil Blackwell Ultra, Rubin (Ultra) a Feynman. Nesou až 2× více křemíku

CD-R server - 19 Březen, 2025 - 11:00
CEO Nvidia na akci Nvidia GTC představil produktovou roadmapu pro architektury a na nich postavené AI akcelerátory až do konce roku 2028. Rubin Ultra zkonzumuje 2× více křemíku než současné čipy…
Kategorie: IT News

BYD dobíjí elektromobily megawattem. Za pět minut dostanou energii na 400 km. První auta jdou na trh v dubnu

Živě.cz - 19 Březen, 2025 - 10:45
Automobilka BYD představila platformu Super E, která má opravdu působivé parametry. Zatímco současné pokročilejší elektromobily přechází na 800V architekturu, BYD má rovnou 1000 V. Když k tomu přidáme 1000 A, je výsledkem nabíjecí výkon milión wattů, neboli 1 MW (nabíjení třídy 10C). I ty ...
Kategorie: IT News

Show top LLMs some code and they'll merrily add in the bugs they saw in training

The Register - Anti-Virus - 19 Březen, 2025 - 10:32
One more time, with feeling ... Garbage in, garbage out

Researchers have found that large language models (LLMs) tend to parrot buggy code when tasked with completing flawed snippets.…

Kategorie: Viry a Červi

Za tři kliky 15 EUR, aneb jak jsem okradl podvodníky

VIRY.CZ - 17 Březen, 2025 - 19:22

To mě takhle jednou přes Telegram napsala Melissa s nabídkou práce a možností výdělku 15 EUR až 300 EUR za 10 minut. Neodolal jsem a odepsal…

Zájem o práci jsem musel schválit odesláním zprávy ve tvaru OK + věk. Odpovídám tedy „OK 76“. Následně dostávám kontakt na další účet na Telegramu – Scarlett, což by měla mít manažerka Melissy. Té znova potvrzuji zájem o práci a ona mě dává první úkol – „olajkovat“ srdíčkem tři konkrétní hotely na booking.com a poslat o tom důkaz v podobě screenshotů. Zapínám tedy srdíčko u prvního hotelu na booking.com, vytvářím screenshot a posílám ho Scarlett do Telegramu. Stejně tak u druhého a třetího hotelu. Scarlett mě gratuluje a odkazuje na svého manažera Annu (tedy další účet na Telegramu), které mám zaslat kód „B0051“. S ní se mám domluvit i na výplatě.

Tady to začalo… Přes Melissu ke Scarlett… Přes Scarlett k Anně… Anna se postarala o to, že mě těch 15 EUR opravdu přišlo!

Anně posílám „B0051“ a ona mě opět gratuluje ke splnění třech úkolů a informuje mě o odměně 15 EUR. Mimochodem, všechny tři ženy jsou opravdu krásky. Je vidět, že Anna, jako manažerka manažerky, má i dost peněz na plastiky. Stačí si projít profilové fotky Telegram účtu. Všechny tři krásky mají i docela blbou češtinu, ale snaží se. Výplatu můžu dostat buď v USDT nebo na Revolut v eurech. Vybírám Revolut a posílám IBAN a mé jméno a příjmení, tedy Franta Kuldan. Během 15 minut mě na Revolut přistává 15 EUR! Anna je starostlivá, chce, abych ji poslal screenshot z Revolut, že peníze opravdu dorazily. Posílám ho a Anna mě nabízí další spolupráci. Souhlasím. Pokud budu v podobném duchu pracovat 3 po sobě jdoucí dny, dostanu až 275 EUR. Pokud to vydržím 30 po sobě jdoucích dní, dostanu 3500 EUR.

Nicméně ještě předtím je nutné vytvořit si pracovní účet na portálu www.eurotriphotels.top. Anna mě posílá kód pro registraci. Registraci dokončuji a Anně posílám screenshot jakožto důkaz. Jen za registraci na portálu dostávám odměnu dalších 5 dolarů (wow!), které mě jsou přičteny na hotelový účet v portálu. Na portálu objevuji volbu pro výběr peněz – Withdraw money. Vidím tam těch 5 dolarů i můj IBAN účet. Ptám se Anny, jaké je heslo pro výběr peněz. Anna odpovídá, že pokud chci prostředky vybrat, musím splnit kombinovaný úkol a že mě to zítra všechno naučí. Posílá mě odkaz do pracovní skupiny Telegramu, která se jmenuje „Česká hotelová mise-08-02BB“. Popřeje mě krásný večer a ještě mě upozorní, abych nezapomněl, že se začíná v 10h.

Tady mě naskakují další vydělané dolary…

Ráno mě posílá ještě odkaz na další Telegram účet prezentovaný jako „Zákaznicky servis Booking“ s tím, že tam mohu získat odměnu další 2 USD. A opravdu, na hotelový účet portálu mě přistávají další 2 dolary za provedení „checkinu“ (stačilo poslat slovo „CHECK IN“). Pak mě Anna poučila, že mám vyčkat na další instrukce v pracovní skupině „Česká hotelová mise“. V ní je možná dalších 30 nadšených lidí, kteří vykonávají tutéž práci, co já. Ráno se zdraví, večer se loučí se slovy, že to byl náročný den, ale že se zase těší na ten další. Překvapuje mě, kolik cizinců (vzhledem i podle jmen) pracuje pro stejnou organizaci a že se všichni snaží mluvit česky. Cítím se jako doma. Snažím se navázat kontakt. Mezitím ale přicházejí úkoly pro tento den. Tentokrát nedáváme srdíčka na booking.com, ale agoda.com. Jedu podobným stylem jako na začátku. Zapnu srdce, screenshot, pošlu důkaz. Screenshoty posílají do skupiny „Česká hotelová mise“ i další účastníci. Dostávám gratulace od zákaznického servisu a na hotelovém účtu přistávají další dolary.

Ve skupině „Česká hotelová mise“ si všichni sdíleli své úspěchy… …a tešili se na další den.

Někteří aktéři skupiny „Česká hotelová mise“ se účastní i kombinovaného úkolu, kdy si musí zarezervovat hotel a z toho dostanou například 30% provizi. Následně posílají screenshoty svých krypto peněženek, na kterých jim přicházejí stovky dolarů (resp. USDT či Ethereum). Já ale nemám ještě dostatečně velký vstupní kapitál a tak jen sbírám drobné za další a další srdíčka.

Anna je po několika dnech mírně nervózní a píše, kdy už zažádám o kombinovaný úkol. Já jsem taky mírně nervózní, protože za další srdíčka už mě na hotelový účet nechodí další dolary. Anna na mě tlačí, ať splním kombinovaný úkol, že stačí poslat alespoň 25 EUR a velké peníze z provize mě neminou! Dále mě informuje, že všichni ostatní už jsou ve stavu kmenových zaměstnanců na částečný úvazek, jen já jsem poslední černá ovce. Pokud dnes nesplním kombinovaný úkol, bude pro mě pracovní skupina uzavřena…

Realita…

Od začátku jsem věděl, že je to podvod. Přistupoval jsem tedy k celé akci v podobném duchu. Vydával jsem se jako Franta Kuldan. Věk 76. Vůbec jim to nevadilo. Resp. ona to z velké části byla zcela určitě práce botů, tedy že na druhém konci Telegramu neseděl člověk, ale nějaký automat, který se za živou bytost vydával. Podobně jsem řešil i zasílání důkazů v podobě screenshotů. Srdíčka jsem na booking.com / agoda.com u hotelů opravdu zapnul, poslal podvodníkům screenshot, ale pak jsem je opět vypnul. Úkoly jsem tak neplnil a přesto jsem dostával gratulace a odměny. Později jsem srdíčka obarvoval v grafickém editoru. Neznám totiž vnitřní algoritmy agoda.com, zda i vypínání / zapínání nevede k nějakému navyšování popularity daného hotelu, čehož jsem nechtěl docílit.

Sérii telegramových účtů Melissa – Scarlett – Anna, považuji za nějaký vstupní IQ test uživatele. Musíte opisovat kódy, posílat screenshoty, … Podle mě tím podvodníci pouze oddělí „nepoužitelné“ oběti od těch, kde bude nějaká šance k okradení a zároveň jde o uživatele, kteří jsou schopni ovládat chytrý mobilní telefon. To, že nešlo o manažerky manažerů, ale bot účty, dokazuje i fakt, že jsem v průběhu vydělávání fiktivních peněz poslal postupně Melissu i Scarlett vulgárně do hajzlu a nedočkal se žádné reakce. Anna mé chování vůči podřízeným vůbec nereflektovala a určitě o něm ani nevěděla, neboť, a to bylo velké překvapení, mě i přesto, na Revolut těch 15 EUR opravdu přišlo v řádu desítek minut!

Skupina „Česká hotelová mise“ pak byla plná botů zcela jistě. Ty se vydávaly za české spoluobčany, nicméně celkový dojem kazila kvalita jejich psaného projevu, stejně jako všech dalších účastníků podvodu. Stejně tak exotická jména Telegram účtů a exotické profilové fotografie nekorespondovaly s CZ realitou.

Speciální kapitolou pak byly screenshoty z krypto peněženek, které „spolupracovníci“ do skupiny posílali, jakožto důkaz obřích výdělků v řádech stovek dolarů. Screenshoty s příchozí transakcí byly často v nízké kvalitě a nebylo tak možné vytáhnout ID peněženky či transakce a ověřit tak jejich platnost (například přes blockchain explorer). No a tam, kde to možné bylo, jsem dospěl k tomu, že ID peněženky / ID transakce je zcela smyšlené a nebo náleží naprosto jiné kryptoměně, případně ID transakce se uskutečnilo úplně v jinou dobu. Nešlo tak o reálné screenshoty, ale „slepence“ různých grafických podkladů. Specialitou pak bylo zjištění, že sem tam se u screenshotů opakovalo shodné ID transakce, ovšem s rozdílnou částkou a odlišným datumem realizace.

Takových příkladů by šlo najít několik… …shodné ID transakce se nemůže principiálně opakovat.

To je technicky nemyslitelné a pouze dokazuje, že tohle celé je jeden velký podvod a skupina „Česká hotelová mise“ měla být jen takovým divadlem pro oběť, aby se i ona do akce zapojila a využila vlastních finančních prostředků, neboť úspěchy ostatních se to tam jenom hemžilo. A patrně tenhle model funguje, protože jinak by Vám těžko podvodníci jen tak poslali skutečných 15 EUR, jako se to stalo v mém případě (Revolut), což jsem opravdu nečekal. Sociální inženýrství / oblbování a další naskakující virtuální eura na „hotelovém účtu“ webu www.eurotriphotels.top (ač pochybně vypadajícího) pak mohou oběť opravdu motivovat k tomu, aby těch již reálných 15 EUR vzali, přidali pár vlastních (s pocitem, že už je klikáním srdíček na hotelovém účtu stejnak vydělali) a podvodníkům je pro „kombinovaný úkol“ poslali zpět s očekáváním dalšího zisku.

V téhle hře jsem ale nepokračoval. Na závěr jsem tak poslal do hajzlu i Annu a ta jediná reagovala s tím, že jsem starý nechutný muž (patrně kvůli tomu zfixlovanému věku 76 let) a že na mě volá policii. Nic z toho se pochopitelně nestalo a já odcházím s 15 EUR za nic, zatímco podvodníci ostrouhali

The post Za tři kliky 15 EUR, aneb jak jsem okradl podvodníky appeared first on VIRY.CZ.

Kategorie: Viry a Červi

Staying Sane in an Insane World

Singularity Weblog - 15 Březen, 2025 - 15:46
How do I stay sane in this insane world? This is one question I’ve repeatedly asked myself over the past several years. I wish I had THE answer, but truthfully, I still struggle daily. Yet, I’ve discovered a few reliable practices that help me climb back onto the bandwagon of inner peace and equanimity whenever […]
Kategorie: Transhumanismus

Cybersecurity Regulations and Compliance for Linux Users

LinuxSecurity.com - 27 Září, 2024 - 14:59
Security is an essential consideration when using computers and other technological devices. Linux admins and organizations must be informed about applicable legal measures related to the safety of their systems to ensure compliance and protect against possible risks.
Kategorie: Hacking & Security

Critical CUPS Vulnerability Exposes Linux Systems to Remote Hijacking

LinuxSecurity.com - 27 Září, 2024 - 13:00
CUPS, or the Common Unix Printing System , is an open-source printing system widely utilized on Unix-like operating systems such as Linux, BSDs, and macOS. CUPS acts as an open-source print server, allowing a computer to become an effective print server while managing print jobs and queues and providing a standardized interface for printing services.
Kategorie: Hacking & Security

Essential Server Security Security Strategies for Administrators

LinuxSecurity.com - 26 Září, 2024 - 21:12
In the current threat landscape, Linux servers have emerged as a dominant force, underpinning approximately 81% of all websites globally. Despite the prevalence of Windows in personal computing, Linux's resilience to various threats is a significant factor behind its extensive adoption, particularly in web hosting and enterprise environments.
Kategorie: Hacking & Security

Google Chooses Passkeys Over Passwords: Examining the Security Benefits for Linux Users

LinuxSecurity.com - 26 Září, 2024 - 15:53
In a bold move towards a future without traditional passwords, Google has introduced secure passkey sign-ins across almost all devices, including Windows, macOS, Linux, and Android. This change will revolutionize how users authenticate their identity online, providing a more secure and seamless experience.
Kategorie: Hacking & Security

The Risks of Default Router Security Settings for Home Users: A Comprehensive Analysis

LinuxSecurity.com - 25 Září, 2024 - 23:18
In 2024, the connected world requires our homes to serve as hubs for various devices, from computers and smartphones to smart fridges and security cameras. Still, many home users remain unaware of the risk posed by default router security settings, as revealed in Broadband Genie's 2024 Router Security Survey results .
Kategorie: Hacking & Security

Linux Security Modules (LSM): SELinux vs AppArmor vs TOMOYO

LinuxSecurity.com - 25 Září, 2024 - 16:54
Linux has long been celebrated for its versatility, robustness, and vast array of security features it offers. A key aspect of maintaining and improving Linux security is using Linux Security Modules (LSMs) to manage access control policies.
Kategorie: Hacking & Security

Google Chrome 129: Addressing Crucial Vulnerabilities and Enhancing Security

LinuxSecurity.com - 25 Září, 2024 - 14:32
Google Chrome remains the crown jewel in the browser market, with an impressive user base of approximately 3.45 billion. However, this immense popularity has made it a focal point for malicious actors, and any security flaw in this widely used browser can have significant repercussions for users worldwide.
Kategorie: Hacking & Security
Syndikovat obsah