The recent surge in sophisticated phishing campaigns targeting SaaS environments has laid bare the evolving tactics leveraged by cybercriminals—particularly the abuse of reputable cloud services and the subversion of multi-factor authentication (MFA) controls. In late 2024 and early 2025, the...
A new browser-based threat dubbed the “Cookie-Bite” attack is capturing the cybersecurity community’s attention, raising major concerns over the integrity of authentication within cloud environments like Microsoft Azure, Microsoft 365, Google Workspace, AWS, and others. The discovery, recently...
A new and sophisticated species has entered the phishing ecosystem, and its name is Tycoon 2FA. At a time when digital security feels like a relentless arms race, this phishing-as-a-service (PhaaS) platform epitomizes just how quickly adversaries adapt to modern defenses—forging an unsettling...
If you run a major chunk of your business on Microsoft 365, you might want to put that celebratory “we passed another compliance audit” cake back in the fridge, at least until you hear about the latest episode of Authentication Drama Theatre: the “Cookie Bite” attack. This newly publicized trick...
Microsoft 365 Phishing Kit Evolves: A New Breed of Stealth Attacks Surges
In the constantly evolving cybersecurity battlefield, attackers relentlessly innovate to stay one step ahead of defenders. The latest example comes from the dark underworld of phishing-as-a-service (PhaaS), where a...
Unveiling a Fileless Attack: Weaponizing DCOM for NTLM Authentication Coercions
In the ever-evolving landscape of cybersecurity, attackers are continuously refining their tactics to breach networks stealthily. A prime example is the recent research on weaponizing Distributed Component Object...
Stealing user credentials is an ever-evolving cybersecurity threat, and few techniques capture the complexity of modern attacks like Evilginx does. At its core, Evilginx repurposes the legitimate, widely used nginx web server to launch man-in-the-middle attacks that can pilfer usernames...
In computer science, session hijacking is the exploitation of a valid computer session (commonly known as a "session key") used to gain unauthorized access to information or services in a computer system.
For example, when a user logs in to a web site, the user's PC is tagged with a session...
access control
browser cookie
computer security
cookie theft
cookiejacking
cybersecurity
data protection
encryption
information security
intermediary attack
internet threats
magic cookie
secure connection
sessionhijackingsession key
tcp hijacking
unauthorized access
user authentication
web development
web security
Revision Note: V1.0 (September 14, 2010): Advisory published.Summary: Microsoft has completed the investigation of a publicly disclosed vulnerability in Outlook Web Access (OWA) that may affect Microsoft Exchange customers. An attacker who successfully exploited this vulnerability could hijack...
advisory
attacker
authentication
customer impact
email security
exchange
investigation
microsoft
october
outlook
owa
risk
security
sessionhijacking
vulnerability
web access
Revision Note: V1.0 (September 14, 2010): Advisory published.Summary: Microsoft has completed the investigation of a publicly disclosed vulnerability in Outlook Web Access (OWA) that may affect Microsoft Exchange customers. An attacker who successfully exploited this vulnerability could hijack...
Revision Note: V1.0 (September 14, 2010): Advisory published. Advisory Summary:Microsoft has completed the investigation of a publicly disclosed vulnerability in Outlook Web Access (OWA) that may affect Microsoft Exchange customers. An attacker who successfully exploited this vulnerability could...
Revision Note: V1.0 (September 14, 2010): Advisory published.Summary: Microsoft has completed the investigation of a publicly disclosed vulnerability in Outlook Web Access (OWA) that may affect Microsoft Exchange customers. An attacker who successfully exploited this vulnerability could hijack...