identity security

  1. Protect Yourself from Calendar Phishing Scams in Microsoft 365

    There’s a growing threat in the digital landscape that preys on trust rather than technical vulnerability. It slips quietly into our daily lives, masquerading not as suspicious spam, but as the kind of corporate communication we expect: a calendar invite. For millions of Microsoft 365 and...
  2. Microsoft’s Passwordless Future: What You Need to Know About the August Transition

    Microsoft's drive towards a passwordless future is entering a transformative and controversial new phase, with the tech giant set to delete all saved passwords from its Authenticator platform in August—a move projected to affect roughly 75 million users worldwide. This ambitious overhaul...
  3. June 2025 Critical CVEs: Top Exploitable Vulnerabilities Every IT Team Must Patch Now

    June 2025 brought several new vulnerabilities into sharp focus for IT professionals, from newly disclosed exploits in core enterprise federation services to critical flaws lurking in everyday collaboration platforms. Cutting through the noise, it’s clear that not every CVE carries equal...
  4. Essential Microsoft 365 Security Strategies for Small Businesses in 2025

    For small businesses leveraging Microsoft 365, security is no longer a passive IT checkbox—it is a living, breathing discipline that can directly impact the survival and reputation of an organization. The surge in cyberattacks exploiting cloud misconfigurations and the rise of sophisticated...
  5. Buenos Aires Supreme Court Revolutionizes Credentialing with Digital Identity

    In 2024, the Supreme Court of Buenos Aires (SCBA), one of Latin America's largest provincial judicial institutions, faced significant challenges with its traditional credentialing system. The existing process was cumbersome, costly, and inefficient, leading to delays and security...
  6. Uncovering the nOAuth Vulnerability: Risks and Remedies in Microsoft Entra Cloud Security

    Microsoft’s cloud ecosystem continues to underpin enterprise digital transformation—yet the discovery and persistence of the nOAuth vulnerability within Entra-integrated applications shines a harsh light on lingering risks at the intersection of identity management, software-as-a-service, and...
  7. nOAuth Vulnerability: The Hidden Threat Endangering 15,000+ SaaS Apps and How to Protect Your Enterprise

    A critical authentication flaw within Microsoft’s Entra ID ecosystem continues to threaten tens of thousands of enterprise applications worldwide, illustrating a profound challenge for the current state of SaaS security two years after its discovery. The vulnerability, dubbed “nOAuth,” first...
  8. Microsoft Defender for Identity Introduces Domain-Based Scoping for Enhanced Security Operations

    Microsoft Defender for Identity is taking a significant leap forward in security operations efficiency by introducing domain-based scoping for Active Directory (AD), a much-awaited feature now rolling out in public preview. As environments grow in size and complexity, security teams grapple with...
  9. Microsoft Phases Out Outdated File Access Methods to Boost Security in 2025

    Microsoft is set to enhance the security framework of its Microsoft 365 suite by phasing out outdated file access methods starting in mid-July 2025. This initiative will disable legacy authentication protocols such as Relying Party Suite (RPS) and FrontPage Remote Procedure Call (FPRPC) across...
  10. Golden SAML Attacks in Cybersecurity: How to Detect and Prevent Enterprise Breaches

    In the shadowy landscape of cybersecurity, most organizations wrestle with threats as old as the internet itself: brute-forced passwords, relentless phishing campaigns, and credential stuffing attacks. Yet, among these familiar dangers, a more insidious risk quietly stalks even the most...
  11. Protecting Microsoft Entra ID from AI-Driven Cloud Identity Attacks Using TeamFiltration

    A new and deeply concerning evolution in cyberattack methodology is putting Microsoft Entra ID (formerly known as Azure Active Directory) users and organizations at unprecedented risk. This surge in account takeover (ATO) campaigns exploits TeamFiltration—a legitimate penetration testing tool...
  12. Defending Against Microsoft Entra ID Password Spraying: Essential Strategies

    Microsoft account users are once again facing a formidable cybersecurity threat—this time in the form of an aggressive password spraying campaign targeting Entra ID accounts at an unprecedented scale. According to multiple verified industry sources, a threat group known as SneakyStrike, also...
  13. Microsoft Defender for Identity and Okta Integration: Enhancing Cloud Identity Security

    In today’s enterprise security landscape, identity has become the new battleground. As cloud adoption accelerates and hybrid workforces proliferate, attackers—ranging from nation-state actors to cybercriminal organizations—are no longer exclusively targeting endpoints or applications. Instead...
  14. UNK_SneakyStrike: How Hackers Exploit Legitimate Cloud Security Tools at Scale

    A new chapter in the ongoing battle for cloud security unfolded recently, as researchers disclosed a brazen and remarkably methodical campaign that has compromised over 80,000 user accounts spanning hundreds of organizations. The abuse of penetration testing tools—originally intended as shields...
  15. Semperis Enhances DSP to Combat Critical Windows Server 2025 Active Directory Vulnerability

    In a significant development for enterprise security, Semperis has announced enhancements to its Directory Services Protector (DSP) platform, aimed at mitigating a critical vulnerability in Windows Server 2025's Active Directory. This vulnerability, dubbed "BadSuccessor," was identified by...
  16. Windows Server 2025 Security: Detecting and Preventing 'BadSuccessor' Privilege Escalation

    In a significant development for Windows Server 2025 security, Semperis has introduced advanced detection capabilities within its Directory Services Protector platform to counteract the "BadSuccessor" privilege escalation technique. This initiative, in collaboration with Akamai, addresses...
  17. Windows Server 2025 dMSAs Vulnerability: How to Detect and Prevent Privilege Escalation

    In the dynamic and continually evolving world of enterprise cybersecurity, the introduction of new technologies that promise both innovation and efficiency often brings with it fresh vectors for attack. The latest development in Windows Server 2025—specifically the new feature known as delegated...
  18. Semperis Enhances Windows Server 2025 Security Against 'BadSuccessor' Privilege Escalation

    In a significant development for Windows Server 2025 security, Semperis has unveiled enhanced detection capabilities within its Directory Services Protector (DSP) platform. This initiative, in collaboration with Akamai, aims to counteract the "BadSuccessor" privilege escalation technique that...
  19. Semperis and Akamai Join Forces to Protect Windows Server 2025 AD from Critical Vulnerability

    In a significant move to bolster cybersecurity defenses, Semperis and Akamai have joined forces to address a critical vulnerability in Active Directory (AD) within Windows Server 2025. This collaboration underscores the escalating threats targeting AD environments and the necessity for robust...
  20. Critical Cisco ISE Cloud Vulnerability (CVE-2025-20286): Static Credentials Risk

    In what has quickly become one of the most alarming enterprise security revelations of the year, Cisco’s Identity Services Engine (ISE) has been found critically vulnerable when deployed on major cloud platforms including Amazon Web Services (AWS), Microsoft Azure, and Oracle Cloud...