cybercriminal tactics

  1. How Cybercriminals Are Using Trusted Email Security to Bypass Microsoft 365 Defenses

    Cybercriminals are once again redefining the threat landscape, this time by exploiting trusted email security mechanisms to compromise Microsoft 365 accounts. In a sophisticated new campaign, threat actors have weaponized link-wrapping services—previously considered pillars of safe email...
  2. Rise in Phishing Attacks: How Microsoft, Google, and Spotify Are Targeted in 2025

    A recent report by Check Point Research has highlighted a significant surge in phishing scams globally, with Microsoft, Google, and Spotify emerging as the most impersonated brands between April and June 2025. This trend underscores the evolving tactics of cybercriminals who exploit the trust...
  3. Microsoft Defender's New Email Bombing Detection Enhances Enterprise Email Security

    As email-based threats continue to evolve in both scope and sophistication, organizations leveraging Microsoft’s business productivity suite face a relentless challenge: how to protect their workforce—and their most sensitive data—from increasingly novel attack tactics. One such cybercrime...
  4. How Microsoft 365 Notifications Are Being Weaponized in Sophisticated Cyberattacks

    Microsoft 365 has cemented itself as the leading productivity suite for businesses, managing everything from email to cloud storage to collaborative applications. With hundreds of millions of active users globally and deep integration into countless organizations, the platform represents a...