A New Phishing Frontier: Tycoon2FA Evolving to Outsmart Microsoft 365 Security
Phishing attacks are evolving, and the latest twist comes from the Tycoon2FA phishing kit. Designed as a Phishing-as-a-service (PhaaS) platform, Tycoon2FA is notorious for bypassing multi-factor authentication (MFA)...
Unveiling a Fileless Attack: Weaponizing DCOM for NTLM Authentication Coercions
In the ever-evolving landscape of cybersecurity, attackers are continuously refining their tactics to breach networks stealthily. A prime example is the recent research on weaponizing Distributed Component Object...
Stealing user credentials is an ever-evolving cybersecurity threat, and few techniques capture the complexity of modern attacks like Evilginx does. At its core, Evilginx repurposes the legitimate, widely used nginx web server to launch man-in-the-middle attacks that can pilfer usernames...
In computer science, session hijacking is the exploitation of a valid computer session (commonly known as a "session key") used to gain unauthorized access to information or services in a computer system.
For example, when a user logs in to a web site, the user's PC is tagged with a session...
Revision Note: V1.0 (September 14, 2010): Advisory published.Summary: Microsoft has completed the investigation of a publicly disclosed vulnerability in Outlook Web Access (OWA) that may affect Microsoft Exchange customers. An attacker who successfully exploited this vulnerability could hijack...
advisory
attacker
authentication
customer impact
email security
exchange
investigation
microsoft
october
outlook
owa
risk
security
sessionhijacking
vulnerability
web access
Revision Note: V1.0 (September 14, 2010): Advisory published.Summary: Microsoft has completed the investigation of a publicly disclosed vulnerability in Outlook Web Access (OWA) that may affect Microsoft Exchange customers. An attacker who successfully exploited this vulnerability could hijack...
Revision Note: V1.0 (September 14, 2010): Advisory published. Advisory Summary:Microsoft has completed the investigation of a publicly disclosed vulnerability in Outlook Web Access (OWA) that may affect Microsoft Exchange customers. An attacker who successfully exploited this vulnerability could...
Revision Note: V1.0 (September 14, 2010): Advisory published.Summary: Microsoft has completed the investigation of a publicly disclosed vulnerability in Outlook Web Access (OWA) that may affect Microsoft Exchange customers. An attacker who successfully exploited this vulnerability could hijack...