session hijacking

  1. Storm-2755 Payroll Pirate Attacks: AiTM Session Hijacking Redirects Canadian Wages

    Microsoft’s latest Storm-2755 research is a sharp reminder that payroll fraud has evolved far beyond simple credential theft. In the campaign Microsoft DART analyzed, attackers used malvertising, SEO poisoning, and adversary-in-the-middle (AiTM) phishing to hijack sessions, bypass MFA, and...
  2. CVE-2026-5119 Libsoup Cookie Leak via HTTP Proxy CONNECT Enables Session Hijacking

    When a vulnerability lives in a network library rather than an end-user app, the blast radius is often much larger than the CVSS score alone suggests. That is the case with CVE-2026-5119, a libsoup flaw that can leak session cookies in cleartext during HTTPS tunnel establishment through an HTTP...
  3. ArmorBlock 5000 Webserver Flaws: Patch CVE-2025-7773/7774 Now

    A pair of high-severity vulnerabilities in Rockwell Automation’s ArmorBlock 5000 I/O webserver — tracked as CVE-2025-7773 and CVE-2025-7774 — create a realistic, low-complexity path for remote attackers to hijack or misuse web sessions on specific 5032-series modules, prompting immediate...
  4. New Sophisticated Phishing Attacks Threaten Microsoft Account Security in 2025

    An alarming surge in sophisticated hacker activity is threatening the security of Microsoft accounts worldwide, with cybercriminals successfully bypassing even advanced defenses such as two-factor authentication. Security researchers at Proofpoint have unearthed an ingenious credential phishing...
  5. New Microsoft 365 Phishing Attacks Bypass 2FA via OAuth Abuse in 2025

    A rapidly escalating security threat has emerged for organizations relying on Microsoft 365, as hackers have devised sophisticated phishing campaigns that can bypass even two-factor authentication (2FA) protections. Since the beginning of 2025, attackers have compromised nearly 3,000 accounts...
  6. Cyber Threats 2025: How Attackers Weaponize Microsoft OAuth to Bypass MFA

    Threat actors in 2025 have harnessed a new caliber of cyberattack, subverting enterprise identity and trust by weaponizing Microsoft OAuth applications to bypass even the most robust multi-factor authentication (MFA) defenses. This emerging campaign, tracked by Proofpoint and other leading...
  7. 2025 Microsoft OAuth Phishing Surge: How Attackers Bypass MFA and Compromise Cloud Security

    Phishing campaigns have always shaped themselves around the contours of new technology, but the latest surge targeting Microsoft OAuth applications marks a seismic shift in both attacker strategy and the effectiveness of their exploits. In 2025, security researchers uncovered a wave of hybrid...
  8. Secure Your Microsoft 365 Identity Layer: Strategies to Prevent Cyberattacks

    Identity has rapidly become the new battleground in the fight for organizational security, especially as cybercriminals innovate to sidestep robust perimeter defenses. While firewalls, endpoint protection, and phishing detection continuously improve, attackers are leveraging stolen or...
  9. Mastering Microsoft 365 Identity Security: Protect Against Modern Cyber Threats in 2025

    Organizations of every size have come to rely on Microsoft 365 as the digital nervous system powering their communication, collaboration, and data management. With its robust ecosystem—spanning Exchange Online, SharePoint, Teams, and the evolving Entra ID (Azure AD)—Microsoft 365 has brought...
  10. PoisonSeed Phishing Toolkit Bypasses FIDO2 Security in Enterprise Settings

    In recent developments, cybersecurity researchers have uncovered a sophisticated phishing toolkit named PoisonSeed, designed to circumvent the robust protections offered by FIDO2 authentication. This malicious tool targets users of Microsoft 365, Google Workspace, and Okta by redirecting their...
  11. The New Era of AI-Driven Phishing: Protecting Cloud Services from Flawless Attacks

    A new era of phishing is underway, and the stakes have never been higher for organizations relying on Microsoft 365, Okta, and similar cloud-driven services. The weaponization of artificial intelligence, most recently exemplified by the abuse of Vercel’s v0 generative AI design tool, has made it...
  12. Defending Against Advanced AitM Phishing Attacks on Microsoft 365 and Google Accounts

    Organizations across the globe are contending with a staggering rise in highly advanced phishing attacks that specifically target Microsoft 365 and Google accounts. At the heart of this surge is the Adversary-in-the-Middle (AitM) technique—a significant evolution in cybercriminal methodology...
  13. Securing Nuance NDEP: Mitigating CVE-2025-47977 Cross-Site Scripting Vulnerability

    The Nuance Digital Engagement Platform (NDEP) has recently been identified as vulnerable to a cross-site scripting (XSS) flaw, cataloged as CVE-2025-47977. This vulnerability allows authorized attackers to perform spoofing attacks over a network by exploiting improper neutralization of input...
  14. Tycoon2FA and Dadsec: The Rising Threat of Advanced Phishing-as-a-Service Campaigns

    A new breed of cyber threats is rapidly transforming the landscape of enterprise security, and few recent campaigns illustrate this better than the large-scale, meticulously coordinated attacks attributed to Storm-1575, more commonly known as the Dadsec hacker group. Over the past year, Dadsec...
  15. Lumma Malware Disaster: Protect Your Windows PC from the Latest Info-Stealer Epidemic

    Few threats in today’s digital landscape have demonstrated such rapid, widespread, and evolving danger as the Lumma information-stealing malware currently impacting hundreds of thousands of Windows PCs. In just two months, Microsoft’s security researchers detected Lumma—also known as LummaC2—on...
  16. Siemens PCS Neo Security Flaw Exposes Critical Infrastructure Risks

    The industrial world continues its march toward hyper-connectivity, but each leap forward often exposes new vulnerabilities. Siemens’ SIMATIC PCS neo—a standout in the distributed control system (DCS) space—recently made headlines not for a new feature, but for a security flaw that sharpens the...
  17. Evolving Microsoft Phishing Attacks: How Sophisticated Campaigns Bypass MFA and Cloud Security

    Phishing attacks have long been the scourge of enterprise security, but recent developments reveal a disturbing evolution in cybercriminal tactics targeting Microsoft platforms. A newly uncovered phishing campaign harnesses the trusted veneer of Microsoft Dynamics 365 Customer Voice, weaponizing...
  18. Evolving SaaS Phishing Attacks & How to Defend Against Sophisticated Cybercriminal Tactics

    The recent surge in sophisticated phishing campaigns targeting SaaS environments has laid bare the evolving tactics leveraged by cybercriminals—particularly the abuse of reputable cloud services and the subversion of multi-factor authentication (MFA) controls. In late 2024 and early 2025, the...
  19. Cookie-Bite Attack: Protecting Cloud Sessions from Stealth Browser Extension Threats

    A new browser-based threat dubbed the “Cookie-Bite” attack is capturing the cybersecurity community’s attention, raising major concerns over the integrity of authentication within cloud environments like Microsoft Azure, Microsoft 365, Google Workspace, AWS, and others. The discovery, recently...
  20. Rockstar 2FA: The New Phishing Threat Targeting Microsoft 365 Users

    A new and sophisticated species has entered the phishing ecosystem, and its name is Tycoon 2FA. At a time when digital security feels like a relentless arms race, this phishing-as-a-service (PhaaS) platform epitomizes just how quickly adversaries adapt to modern defenses—forging an unsettling...