cloud security

  1. New Microsoft 365 Phishing Attacks Bypass 2FA via OAuth Abuse in 2025

    A rapidly escalating security threat has emerged for organizations relying on Microsoft 365, as hackers have devised sophisticated phishing campaigns that can bypass even two-factor authentication (2FA) protections. Since the beginning of 2025, attackers have compromised nearly 3,000 accounts...
  2. Regulatory Theater: Microsoft's Data Sovereignty Fight in the EU Exposes Limits of Compliance

    Microsoft’s latest regulatory saga in the European Union has unfolded with all the drama of a high-stakes legal thriller—except the suspense ended not with resolution but with regulatory theater. On July 28, 2025, the European Data Protection Supervisor (EDPS) closed a four-year investigation...
  3. Mitigating Microsoft 365 Phishing Attacks via SMTP Relay Exploitation

    Cybercriminals have ramped up efforts to exploit Microsoft 365’s Direct Send feature and unsecured SMTP relays, launching sophisticated phishing campaigns that masquerade as internal company emails—placing even vigilant organizations at substantial risk. According to recent research by...
  4. Cyberattack Surge Exploiting Trusted Email Link Wrapping to Steal Microsoft 365 Credentials

    A new wave of cyberattacks has exposed a dangerous flaw in trusted email security services, as hackers have successfully exploited protective link-wrapping features to orchestrate large-scale phishing campaigns targeting Microsoft 365 logins. By hijacking the mechanisms designed to keep users...
  5. How Sophisticated Phishing Attacks Exploit Microsoft 365 Security Measures

    A wave of highly sophisticated phishing attacks has put Microsoft 365 users—and the very foundations of modern email security—at risk, exposing a perilous paradox: the same technologies designed to protect cloud productivity platforms are now being systematically exploited to facilitate...
  6. MTN’s Digital Transformation Breakthrough: Over 1,250 Cloud Certifications in Africa

    MTN Group has emerged as a trailblazer in Africa's digital transformation narrative, making headlines for certifying over 1,250 employees through the Microsoft Enterprise Skills Initiative (ESI) in a single year—more than any other Microsoft customer on the continent. This unprecedented internal...
  7. Nayara Energy Cloud Disruption Highlights Risks of Sanctions, Sovereign Cloud & Digital Sovereignty

    A digital storm rumbled through India’s energy and technology sectors when Microsoft temporarily cut off cloud access to Nayara Energy, the country’s second-largest oil refiner, triggering an international debate on sanctions compliance and digital sovereignty. This episode, rooted in Nayara’s...
  8. Microsoft Account Lockout Crisis Highlights Risks of Cloud Dependency and User Vulnerability

    A surge of concern ricocheted across the open-source software community last week when Mike Kaganski, a prominent LibreOffice developer, found himself locked out of his Microsoft account for seven frustrating days. This event, echoing recent reports of arbitrary account lockouts affecting...
  9. Nayara Energy Cloud Disruption Highlights Urgent Need for Digital Sovereignty

    Microsoft’s abrupt suspension of cloud service access to Nayara Energy, a leading Indian oil refiner, has sent shockwaves through the global technology and energy sectors, shining a spotlight on the increasingly complex interplay between geopolitics, corporate structure, and digital sovereignty...
  10. Shield or Sword? How Attackers Exploit Link Wrapping to Bypass Email Security

    Attackers have found a chillingly effective way to subvert defenses integrated into the heart of enterprise email security. According to new research from Cloudflare, threat actors are actively exploiting “link wrapping” services—offered by reputable vendors like Proofpoint and Intermedia—to...
  11. How Cybercriminals Are Using Trusted Email Security to Bypass Microsoft 365 Defenses

    Cybercriminals are once again redefining the threat landscape, this time by exploiting trusted email security mechanisms to compromise Microsoft 365 accounts. In a sophisticated new campaign, threat actors have weaponized link-wrapping services—previously considered pillars of safe email...
  12. Nayara Energy Cloud Disconnection Highlights Rising Risks of Geopolitical Cloud Sanctions

    Microsoft’s abrupt disconnection of Nayara Energy, a major Indian oil refinery operator, from its cloud services sent ripples throughout the global tech and energy sectors—a move spurred not by technical woes, but by geopolitical sanctions issued by the European Union. The incident, emblematic...
  13. Modern Emergency Services with Provance ServiceTeam: Secure, AI-Powered ITSM in Microsoft Cloud

    As emergency services across the globe face a surge in operational demands and heightened expectations for rapid, reliable response, the race to modernize IT service management (ITSM) infrastructure is on. Against the backdrop of relentless workload fluctuations, budgetary constraints, and...
  14. Cybercriminals Exploit Link-Wrapping Services to Launch Sophisticated Phishing Attacks on Microsoft 365

    Cybercriminals have once again proven their adaptability by leveraging trusted technology—from cybersecurity companies themselves—to bypass email defenses and target Microsoft 365 users. In a revealing discovery, threat actors have been exploiting link-wrapping services from well-known vendors...
  15. Exposing the Hidden Threat of Microsoft 365's Direct Send Abuse in Internal Phishing Campaigns

    Leveraging trusted internal channels has long been a gold standard for cybercriminals seeking to evade organizational defenses, but a recent campaign uncovered by Proofpoint signals a new level of ingenuity in exploiting a familiar Microsoft 365 feature: Direct Send. This functionality, designed...
  16. Protecting Your Organization from Microsoft 365 Internal Phishing via Direct Send Exploits

    As cyber threats continue to evolve, organizations leveraging cloud-based productivity suites like Microsoft 365 face novel forms of attack that exploit the platform’s very architecture. Recently, security researchers unveiled a troubling trend: hackers are weaponizing Microsoft 365’s Direct...
  17. Evolving Cloud Phishing Tactics: How Attackers Exploit Microsoft OAuth and AI-Driven Techniques

    The evolution of phishing campaigns in the cloud era has introduced a new breed of attacks that are increasingly hard to spot, even for seasoned security professionals. Among these, a recent campaign targeting Microsoft 365 logins stands out for its cunning use of Microsoft OAuth applications...
  18. Sophisticated Microsoft MFA Phishing Using OAuth: How to Protect Your Enterprise

    Phishing campaigns continue to evolve, adapting to security systems and adopting new tactics to dupe even vigilant users. Recent findings have uncovered a sophisticated Microsoft MFA phishing scheme that leverages the OAuth authorization framework—specifically, Microsoft OAuth applications—to...
  19. Nerdio's Journey: How Cloud Automation Disrupted Enterprise IT with Azure & Microsoft 365

    From a single spark at a Microsoft conference to the glow of a billion-dollar unicorn, Nerdio’s journey is a powerful illustration of how expertise, risk-taking, and an unwavering commitment to customer centricity can disrupt even the most complex corners of enterprise IT. Nerdio, co-founded in...
  20. Cyber Threats 2025: How Attackers Weaponize Microsoft OAuth to Bypass MFA

    Threat actors in 2025 have harnessed a new caliber of cyberattack, subverting enterprise identity and trust by weaponizing Microsoft OAuth applications to bypass even the most robust multi-factor authentication (MFA) defenses. This emerging campaign, tracked by Proofpoint and other leading...