Threat actors in 2025 have harnessed a new caliber of cyberattack, subverting enterprise identity and trust by weaponizing Microsoft OAuth applications to bypass even the most robust multi-factor authentication (MFA) defenses. This emerging campaign, tracked by Proofpoint and other leading...
In a recent revelation, security consultant Haakon Gulbrandsrud of Binary Security uncovered a significant vulnerability within Microsoft Azure's API Connections functionality. This flaw potentially allowed users with minimal privileges to access sensitive data across various Azure services...
In a move sending shockwaves through the global tech and security communities, Microsoft has formally halted the use of China-based engineers for technical support on U.S. military cloud contracts. This decision, which swiftly followed a detailed investigative report, has placed the issue of...
china-based engineers
cloud compliance
cloud infrastructure
cloud outsourcing
cloud security
cloud supply chain
cloudvulnerabilities
cyber espionage
cyber threats
cybersecurity
digital defense
digital sovereignty
global cybersecurity
microsoft
microsoft azure
national security
pentagon cloud support
tech policy
u.s. military
us government technology
A recent security disclosure has unveiled a critical vulnerability within Microsoft 365's PDF export functionality, enabling attackers to perform Local File Inclusion (LFI) attacks and access sensitive files on the server. This flaw, now patched by Microsoft, underscores the importance of...
For years, Microsoft Azure has stood as one of the core pillars of cloud infrastructure for organizations worldwide, embodying the promise of scalable, secure, and flexible platform-as-a-service (PaaS) and infrastructure-as-a-service (IaaS) solutions. However, a newly surfaced set of...
Sophisticated cybercriminals have recently demonstrated yet another way to exploit trust in internal communications—this time, by leveraging a Microsoft 365 feature originally intended for convenience. The Varonis Managed Data Detection and Response (MDDR) forensic team has uncovered a striking...
In the first week of June, the cybersecurity landscape took another sobering turn when The Washington Post fell victim to a targeted email account compromise. Multiple Microsoft 365 work email accounts belonging to journalists were breached, prompting urgent password resets and a rapid...
Cloud environments have become the backbone of modern enterprise IT, enabling rapid deployment, global scalability, and resilient architectures. As more organizations lean heavily on infrastructure-as-a-service solutions from providers like Amazon Web Services (AWS), Microsoft Azure, and Oracle...
A critical security flaw in Cisco’s Identity Services Engine (ISE), catalogued as CVE-2025-20286 with a near-maximum CVSS score of 9.9, is sending shockwaves throughout enterprise IT and cloud security communities alike. The vulnerability, disclosed by Cisco earlier this week and corroborated by...
A wave of concern has swept across the IT security landscape following Cisco’s disclosure of critical vulnerabilities in its Identity Services Engine (ISE) and Customer Collaboration Platform (CCP) tools. Most worryingly, one freshly unearthed flaw in ISE cloud deployments—tracked as...
The sudden exposure of key Commvault infrastructure has ignited urgent concern among SaaS providers and cybersecurity professionals alike, highlighting an increasingly complex threat landscape for cloud-based data protection platforms. The U.S. Cybersecurity and Infrastructure Security Agency...
The announcement of cyber threat activity targeting Commvault’s flagship SaaS cloud application, Metallic, marks a pivotal moment for cloud security and Managed Service Providers (MSPs), especially those tasked with safeguarding Microsoft 365 (M365) environments. As the wave of sophisticated...
The newly disclosed Microsoft Dataverse Elevation of Privilege Vulnerability, known as CVE-2025-29826, has sent ripples through the cloud computing and enterprise IT landscape. For enterprises that rely on Microsoft Dataverse—the heart of the Power Platform, integrating data for Dynamics 365...
access control
api security
cloud security
cloudvulnerabilities
cve-2025-29826
cybersecurity
data privacy
dataverse
enterprise security
it defense
low-code security
microsoft
microsoft security
power apps
power automate
power platform
privilege escalation
privilege management
security patch
vulnerability management
The disclosure of several critical vulnerabilities in Microsoft’s cloud ecosystem, including one rated as a perfect 10.0 on the Common Vulnerability Scoring System (CVSS), marks a pivotal moment in both the enterprise security landscape and public trust in hyperscale providers. Microsoft’s...
In the evolving landscape of cloud security threats, vulnerabilities that affect essential storage services warrant swift attention from enterprises and IT professionals. One of the latest and most pressing of these issues is CVE-2025-29972, a Server-Side Request Forgery (SSRF) vulnerability...
Improper access controls have long been regarded as one of the most impactful vulnerabilities plaguing both cloud and traditional application environments. The recent disclosure of CVE-2025-33072—a Microsoft Azure vulnerability affecting the msagsfeedback.azurewebsites.net endpoint—has again...
Rising cloud vulnerability rates have set off alarm bells across the tech industry, as new research exposes glaring differences in cybersecurity posture among the world’s largest public cloud providers. According to a recent report by CyCognito, revealed in depth by HackRead, Google Cloud and...
Cloud security has rapidly ascended to the top of every IT agenda, propelled by accelerating digital transformation, complex multi-cloud strategies, and a wave of high-profile cyber incidents. Recent findings from CyCognito, a security firm recognized for its attack surface management platform...
Rarely has a week in the world of enterprise IT been as turbulent or as publicly scrutinized as the one Microsoft’s email services just weathered. What began as a planned upgrade to the backbone of the Microsoft 365 ecosystem spiraled into a cascade of outages and authentication snags that left...
authentication issues
business continuity
cloud dependency
cloud infrastructure
cloud outage
cloud services outage
cloudvulnerabilities
digital resilience
email backup
email security
enterprise it
incident management
it contingency plans
it disaster recovery
it incident response
it risk management
microsoft 365
microsoft outlook
software updates
user trust
The best-laid plans of regulators and tech titans alike have gone pixel-shaped, and the digital world is barely hanging onto its cookies. Welcome to the wildest PSW episode yet—where government unraveling meets generative AI hijinx, bot chaos is the new business model, and cybercriminals treat...
ai hijinx
ai in fraud
ai threats
bot attacks
cloud security
cloudvulnerabilities
cybercrime tools
cybersecurity
data breaches
digital espionage
generative ai
government cyber risks
mfa bypass
microsoft security
phaas
phishing
remote work security
slopesquatting
tech regulation