phishing attacks

  1. Cybersecurity Trends 2025: AI Risks, Hardware Backdoors, and Adaptive Defenses

    A surge of cyber threats and security debates this week highlights both the escalating sophistication of digital attacks and the evolving strategies defenders employ to stay ahead. From researchers demonstrating how Google’s Gemini AI can be hijacked via innocent-looking calendar invites to...
  2. Microsoft 365 Direct Send Phishing: How Attackers Impersonate Internal Users & How to Protect Your Organization

    A new wave of targeted phishing attacks is sweeping through organizations, exploiting a legitimate Microsoft 365 feature to wreak havoc from inside the trusted walls of enterprise email. Security researchers have recently uncovered threat actors using the Microsoft 365 “Direct Send” capability...
  3. How Phishers Abuse URL Wrapping and Trust in Enterprise Email Security Tools

    An alarming new wave of cybercrime has emerged, leveraging the very security tools designed to shield organizations from harm. Recent research reveals that phishing actors are now abusing link-wrapping and URL-rewriting services—trusted pillars of enterprise email protection—to sneak malicious...
  4. New Sophisticated Phishing Attacks Threaten Microsoft Account Security in 2025

    An alarming surge in sophisticated hacker activity is threatening the security of Microsoft accounts worldwide, with cybercriminals successfully bypassing even advanced defenses such as two-factor authentication. Security researchers at Proofpoint have unearthed an ingenious credential phishing...
  5. New Microsoft 365 Phishing Attacks Bypass 2FA via OAuth Abuse in 2025

    A rapidly escalating security threat has emerged for organizations relying on Microsoft 365, as hackers have devised sophisticated phishing campaigns that can bypass even two-factor authentication (2FA) protections. Since the beginning of 2025, attackers have compromised nearly 3,000 accounts...
  6. How Cybercriminals Exploit Link-Wrapping Services to Hack Microsoft 365 Accounts

    Cybercriminals have developed a sophisticated method to compromise Microsoft 365 accounts by exploiting link-wrapping services, notably those provided by Proofpoint and Intermedia. This technique involves manipulating the very tools designed to protect users, thereby increasing the effectiveness...
  7. Cyberattack Surge Exploiting Trusted Email Link Wrapping to Steal Microsoft 365 Credentials

    A new wave of cyberattacks has exposed a dangerous flaw in trusted email security services, as hackers have successfully exploited protective link-wrapping features to orchestrate large-scale phishing campaigns targeting Microsoft 365 logins. By hijacking the mechanisms designed to keep users...
  8. Protecting Microsoft 365 from Advanced Phishing: Link Wrapping Exploits and Defense Strategies

    Cloudflare has issued a stark warning about a new and highly sophisticated wave of phishing attacks targeting Microsoft 365 users, drawing attention to a dangerous exploitation of a trusted email security feature: link wrapping. In recent weeks, both enterprise and consumer accounts have come...
  9. How Sophisticated Phishing Attacks Exploit Microsoft 365 Security Measures

    A wave of highly sophisticated phishing attacks has put Microsoft 365 users—and the very foundations of modern email security—at risk, exposing a perilous paradox: the same technologies designed to protect cloud productivity platforms are now being systematically exploited to facilitate...
  10. 2025 Phishing Campaign Exploiting Trusted Email Security Tools and Link Wrapping

    A sophisticated phishing campaign exploiting trusted email security tools has rattled the cybersecurity landscape, exposing a dismally clever strategy that turns protective mechanisms into attack vectors. Between June and July 2025, researchers at Cloudflare uncovered an operation wherein...
  11. Shield or Sword? How Attackers Exploit Link Wrapping to Bypass Email Security

    Attackers have found a chillingly effective way to subvert defenses integrated into the heart of enterprise email security. According to new research from Cloudflare, threat actors are actively exploiting “link wrapping” services—offered by reputable vendors like Proofpoint and Intermedia—to...
  12. How Cybercriminals Are Using Trusted Email Security to Bypass Microsoft 365 Defenses

    Cybercriminals are once again redefining the threat landscape, this time by exploiting trusted email security mechanisms to compromise Microsoft 365 accounts. In a sophisticated new campaign, threat actors have weaponized link-wrapping services—previously considered pillars of safe email...
  13. Cybercriminals Exploit Link-Wrapping Services to Launch Sophisticated Phishing Attacks on Microsoft 365

    Cybercriminals have once again proven their adaptability by leveraging trusted technology—from cybersecurity companies themselves—to bypass email defenses and target Microsoft 365 users. In a revealing discovery, threat actors have been exploiting link-wrapping services from well-known vendors...
  14. Exposing the Hidden Threat of Microsoft 365's Direct Send Abuse in Internal Phishing Campaigns

    Leveraging trusted internal channels has long been a gold standard for cybercriminals seeking to evade organizational defenses, but a recent campaign uncovered by Proofpoint signals a new level of ingenuity in exploiting a familiar Microsoft 365 feature: Direct Send. This functionality, designed...
  15. Protecting Microsoft 365 from Internal Phishing via Direct Send Exploits

    Threat actors are increasingly exploiting Microsoft 365’s Direct Send feature to conduct highly convincing internal phishing campaigns, eroding trust within organizations and challenging the efficacy of traditional security defenses. This emergent attack vector, recently highlighted by...
  16. Sophisticated Microsoft MFA Phishing Using OAuth: How to Protect Your Enterprise

    Phishing campaigns continue to evolve, adapting to security systems and adopting new tactics to dupe even vigilant users. Recent findings have uncovered a sophisticated Microsoft MFA phishing scheme that leverages the OAuth authorization framework—specifically, Microsoft OAuth applications—to...
  17. New Wave of Sophisticated Microsoft OAuth Phishing Campaigns in 2025

    Phishing campaigns have always evolved in tandem with advances in enterprise security, but the latest wave targeting Microsoft OAuth applications represents a stunning leap in both sophistication and effectiveness. This ongoing campaign, first identified in early 2025, exemplifies a new breed of...
  18. Russian Cyber Espionage in Moscow: How Secret Blizzard Uses Fake Antivirus and AiTM Attacks

    Foreign embassies in Moscow are facing an unprecedented onslaught of cyber espionage, orchestrated by Russian state-backed hackers leveraging an array of advanced techniques to compromise their digital security. According to recent disclosures from Microsoft Threat Intelligence, these actors...
  19. Unmasking Scattered Spider: Protecting Internal Messaging Platforms from Sophisticated Cyber Attacks

    In a rapidly evolving threat landscape marked by sophisticated digital deception, the Scattered Spider hacking group has carved out a notorious reputation for exploiting trust—both technological and human—to compromise some of the world’s most widely used platforms. Recent advisories from...
  20. Inside Scattered Spider: Evolving Tactics and Defense Strategies Against a Global Cyber Threat

    In a development commanding the attention of cybersecurity professionals worldwide, the Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with multiple international law enforcement and cybersecurity entities, has released an updated advisory on the Scattered Spider...