A rapidly escalating security threat has emerged for organizations relying on Microsoft 365, as hackers have devised sophisticated phishing campaigns that can bypass even two-factor authentication (2FA) protections. Since the beginning of 2025, attackers have compromised nearly 3,000 accounts...
Cybercriminals have developed a sophisticated method to compromise Microsoft 365 accounts by exploiting link-wrapping services, notably those provided by Proofpoint and Intermedia. This technique involves manipulating the very tools designed to protect users, thereby increasing the effectiveness...
A new wave of cyberattacks has exposed a dangerous flaw in trusted email security services, as hackers have successfully exploited protective link-wrapping features to orchestrate large-scale phishing campaigns targeting Microsoft 365 logins. By hijacking the mechanisms designed to keep users...
Attackers have found a chillingly effective way to subvert defenses integrated into the heart of enterprise email security. According to new research from Cloudflare, threat actors are actively exploiting “link wrapping” services—offered by reputable vendors like Proofpoint and Intermedia—to...
Cybercriminals have once again proven their adaptability by leveraging trusted technology—from cybersecurity companies themselves—to bypass email defenses and target Microsoft 365 users. In a revealing discovery, threat actors have been exploiting link-wrapping services from well-known vendors...
The evolution of phishing campaigns in the cloud era has introduced a new breed of attacks that are increasingly hard to spot, even for seasoned security professionals. Among these, a recent campaign targeting Microsoft 365 logins stands out for its cunning use of Microsoft OAuth applications...
Organizations of every size have come to rely on Microsoft 365 as the digital nervous system powering their communication, collaboration, and data management. With its robust ecosystem—spanning Exchange Online, SharePoint, Teams, and the evolving Entra ID (Azure AD)—Microsoft 365 has brought...
In today's digital landscape, Microsoft 365 stands as a cornerstone for organizational productivity, offering a suite of tools that facilitate communication, collaboration, and data management. However, recent analyses reveal that many organizations may be underestimating the vulnerabilities...
Password spraying attacks have become one of the most persistent and damaging techniques in the arsenal of modern cybercriminals, as demonstrated by a newly disclosed incident in which over 80,000 Microsoft Entra ID accounts were targeted using legitimate penetration testing tools. According to...
Microsoft account users are once again facing a formidable cybersecurity threat—this time in the form of an aggressive password spraying campaign targeting Entra ID accounts at an unprecedented scale. According to multiple verified industry sources, a threat group known as SneakyStrike, also...
Phishing attacks continue to evolve, leveraging not only increasingly sophisticated social engineering techniques but also the legitimate tools and platforms users trust every day. The most recent wave of attacks, as publicized by cybersecurity researchers and industry reports, reveals that...
The growing adoption of generative AI in the workplace has ushered in sweeping changes across industries, delivering newfound efficiencies and innovative capabilities. Yet, with each leap toward automation and intelligence, a parallel, shadowy world of cyber threats surges ahead. A recent...
In the digital age, password security is not just a buzzword—it’s a critical aspect of everyday digital life, especially for Windows users and enthusiasts who manage a multitude of online accounts, from Microsoft services to gaming platforms and beyond. The importance of World Password Day goes...
Russian cybercriminals have added a new feather to their well-worn capes of mischief, now targeting Microsoft account holders by exploiting the trust we put into Signal and WhatsApp—apps once considered bastions of privacy. If you’re an IT professional, human rights advocate, or simply a...
Russian hackers have figured out a way to weaponize OAuth 2.0 authentication—yes, that protocol you trusted implicitly last Tuesday when you breezed through another Microsoft 365 login screen—turning what should be a knight in shining armor into a digital Trojan horse galloping straight through...
Every time the cybersecurity community thinks they’re getting ahead of attackers, someone comes along and turns a trusted workflow into a digital bear trap. That’s exactly what’s unfolding in the latest campaign orchestrated by Russian threat actors who are gleefully exploiting legitimate...
In a recent development, Russian threat actors identified as UTA0352 and UTA0355 have been targeting Ukraine-linked nongovernmental organizations (NGOs) by exploiting the OAuth protocol to compromise Microsoft 365 accounts.
The Mechanics of the Attack
The attackers initiated their campaign with...
Microsoft 365 users—especially those with links to Ukraine or human rights circles—have recently been finding themselves the unwitting stars in an international cyber-thriller: Russian-linked hackers are back, and this time, they've upgraded from phishing Netflix logins to abusing Microsoft's...