credential harvesting

  1. Microsoft 365 Direct Send Phishing: How Attackers Impersonate Internal Users & How to Protect Your Organization

    A new wave of targeted phishing attacks is sweeping through organizations, exploiting a legitimate Microsoft 365 feature to wreak havoc from inside the trusted walls of enterprise email. Security researchers have recently uncovered threat actors using the Microsoft 365 “Direct Send” capability...
  2. New Sophisticated Phishing Attacks Threaten Microsoft Account Security in 2025

    An alarming surge in sophisticated hacker activity is threatening the security of Microsoft accounts worldwide, with cybercriminals successfully bypassing even advanced defenses such as two-factor authentication. Security researchers at Proofpoint have unearthed an ingenious credential phishing...
  3. Evolving Cloud Phishing Tactics: How Attackers Exploit Microsoft OAuth and AI-Driven Techniques

    The evolution of phishing campaigns in the cloud era has introduced a new breed of attacks that are increasingly hard to spot, even for seasoned security professionals. Among these, a recent campaign targeting Microsoft 365 logins stands out for its cunning use of Microsoft OAuth applications...
  4. Unmasking Scattered Spider: Protecting Internal Messaging Platforms from Sophisticated Cyber Attacks

    In a rapidly evolving threat landscape marked by sophisticated digital deception, the Scattered Spider hacking group has carved out a notorious reputation for exploiting trust—both technological and human—to compromise some of the world’s most widely used platforms. Recent advisories from...
  5. The New Era of AI-Driven Phishing: Protecting Cloud Services from Flawless Attacks

    A new era of phishing is underway, and the stakes have never been higher for organizations relying on Microsoft 365, Okta, and similar cloud-driven services. The weaponization of artificial intelligence, most recently exemplified by the abuse of Vercel’s v0 generative AI design tool, has made it...
  6. RemoteMonologue: The Stealthy DCOM & NTLM Attack Changing Cybersecurity Defense

    In the ever-evolving landscape of cybersecurity, attackers continually adapt their methods to bypass advanced defenses. A recent development in this cat-and-mouse game is the emergence of "RemoteMonologue," a technique that exploits the Distributed Component Object Model (DCOM) in Windows...
  7. Protecting Microsoft 365 from Rising HTML-Based Phishing Attacks

    In recent months, cybersecurity experts have observed a significant uptick in sophisticated phishing attacks targeting Microsoft 365 users. These attacks often employ malicious HTML attachments to bypass traditional email security measures, posing substantial risks to organizations worldwide...
  8. Cyber Espionage Surge: How State-Sponsored Groups Exploit Messaging App Zero-Days in Geopolitical Conflicts

    A surge in targeted cyber espionage operations—orchestrated not just by rogue actors but by state-sponsored groups—has redefined threat landscapes for military and political organizations. One striking recent example involves a Türkiye-linked threat actor, dubbed “Marbled Dust” by Microsoft...
  9. New Phishing Threat: Exploiting Microsoft 365 for Credential Harvesting

    A new breed of phishing attack is shaking up the cybersecurity landscape for Windows and Microsoft 365 users alike. Gone are the days when cybercriminals relied solely on lookalike domains and basic email spoofing. Today’s attackers have taken a page from the playbook of legitimate IT...
  10. Preventing Phishing: Combatting the DocuSign Azure Breach in Europe

    You’ve got mail! It’s from DocuSign, and it looks super legit—a fresh PDF file buzzing with urgency. But spoiler alert, not every DocuSign request deserves a click. If you’re in Europe (or monitor the IT landscape there), brace yourself: a sophisticated phishing campaign is targeting over 20,000...
  11. AA21-110A: Exploitation of Pulse Connect Secure Vulnerabilities

    Original release date: April 20, 2021 Summary The Cybersecurity and Infrastructure Security Agency (CISA) is aware of compromises affecting U.S. government agencies, critical infrastructure entities, and other private sector organizations by a cyber threat actor—or actors—beginning in June 2020...
  12. AA20-301A: North Korean Advanced Persistent Threat Focus: Kimsuky

    Original release date: October 27, 2020 Summary This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 7 framework. See the ATT&CK for Enterprise version 7 for all referenced threat actor tactics and techniques. This joint cybersecurity advisory...
  13. TA17-293A: Advanced Persistent Threat Activity Targeting Energy and Other Critical...

    Original release date: October 20, 2017 Systems Affected Domain Controllers File Servers Email Servers Overview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This alert...