social engineering

  1. Navigating Digital Outages and Cyber Threats: Building Resilience in Florida

    This past weekend, as Microsoft 365 users across the world experienced an unforeseen outage, the disruption sharply highlighted just how dependent our professional and personal lives have become on digital platforms. For those in the thick of Florida’s bustling political heart—where the...
  2. Rockstar 2FA: The New Phishing Threat Targeting Microsoft 365 Users

    A new and sophisticated species has entered the phishing ecosystem, and its name is Tycoon 2FA. At a time when digital security feels like a relentless arms race, this phishing-as-a-service (PhaaS) platform epitomizes just how quickly adversaries adapt to modern defenses—forging an unsettling...
  3. Protecting Microsoft 365 from OAuth Phishing Attacks: Key Insights and Strategies

    Windows users and IT professionals need to take extra caution as attackers continuously refine their phishing playbook. Recent reports reveal that sophisticated adversaries are leveraging vulnerabilities in OAuth 2.0 redirection flows to target Microsoft 365 environments. In these OAuth-themed...
  4. Russian Hackers Exploit OAuth 2.0 in Cyber Espionage Against Ukraine and NGOs

    Russian threat actors have once again raised the bar for cyber espionage, turning attention toward OAuth 2.0 authentication flows in Microsoft 365, hijacking accounts connected to Ukraine and human rights organizations. Their tactics, as uncovered by cybersecurity firm Volexity, fit into a...
  5. Beware Microsoft 365 OAuth Phishing: Protect Your Organization from Diplomatic Cyberattacks

    If you’ve already started mentally composing your next big idea in Outlook, you might want to hit “Save as Draft” for a moment—there’s a new cyberattack in town, and it’s got your Microsoft 365 credentials written all over it... possibly in Cyrillic. A New Breed of Phishing: Sophisticated Social...
  6. Russian Hackers Exploit Messaging Apps to Target Microsoft Accounts and Human Rights Groups

    Russian cybercriminals have added a new feather to their well-worn capes of mischief, now targeting Microsoft account holders by exploiting the trust we put into Signal and WhatsApp—apps once considered bastions of privacy. If you’re an IT professional, human rights advocate, or simply a...
  7. How Hackers Are Using Messaging Apps to Steal Microsoft 365 Credentials

    Microsoft 365 account holders, it’s time to clutch your credentials like your last stick of office coffee—hackers have orchestrated another clever plot, this time through everyone’s favorite messaging apps. If you thought WhatsApp and Signal were just for family chats and cryptic office banter...
  8. Russian Hackers Weaponize OAuth 2.0 to Target Microsoft 365 & High-Value Users in 2025

    Russian hackers have figured out a way to weaponize OAuth 2.0 authentication—yes, that protocol you trusted implicitly last Tuesday when you breezed through another Microsoft 365 login screen—turning what should be a knight in shining armor into a digital Trojan horse galloping straight through...
  9. OAuth 2.0 Attacks: How Hackers Exploit Trust to Hijack Microsoft 365 Accounts in 2023

    There’s a certain poetic irony in the fact that OAuth 2.0—a framework specifically engineered to keep our digital lives safe from password theft—is now being bent and twisted by Russian hackers to hijack entire Microsoft 365 accounts. If that isn’t progress in the field of offensive...
  10. Protecting Remote Support: How to Safeguard Against Quick Assist Scams in 2023

    The heart of modern cybersecurity drama doesn’t thump to the tune of hooded figures feverishly tapping in darkened basements, but to the rhythm of normal-seeming interactions—sometimes under the polite facade of tech support. Once considered a mere handy little utility for the digitally...
  11. How OAuth Attacks Are Targeting Ukrainian NGOs in Russian Cyber-Espionage Campaigns

    If you’re going to be phished, you might as well be courted by some of Russia’s digital finest—at least that’s what a fresh report from Volexity would lead you to believe, as Ukraine-linked NGOs have found themselves starring in an unexpected cyber-espionage romcom, with the Russian hacking...
  12. How Russian Threat Actors Exploit Microsoft 365 OAuth 2.0 for Cyber Attacks in 2023

    Every time the cybersecurity community thinks they’re getting ahead of attackers, someone comes along and turns a trusted workflow into a digital bear trap. That’s exactly what’s unfolding in the latest campaign orchestrated by Russian threat actors who are gleefully exploiting legitimate...
  13. Russian Threat Actors Exploit OAuth to Hack Microsoft 365 Accounts of Ukraine-Linked NGOs

    In a recent development, Russian threat actors identified as UTA0352 and UTA0355 have been targeting Ukraine-linked nongovernmental organizations (NGOs) by exploiting the OAuth protocol to compromise Microsoft 365 accounts. The Mechanics of the Attack The attackers initiated their campaign with...
  14. Beware of OAuth Phishing: How Cybercriminals Exploit Trust in Microsoft 365 Security

    They say trust is the cornerstone of any relationship—especially if that relationship is between you, the internet, and a determined Russian adversary with a penchant for phishy invitations and suspicious requests for OAuth codes. Phishing in the OAuth Era: New Tricks for Old Hackers When we...
  15. How Russian Hackers Are Exploiting Microsoft 365 and OAuth in 2025

    Microsoft 365 users—especially those with links to Ukraine or human rights circles—have recently been finding themselves the unwitting stars in an international cyber-thriller: Russian-linked hackers are back, and this time, they've upgraded from phishing Netflix logins to abusing Microsoft's...
  16. Protecting Microsoft 365 from Social Engineering & OAuth Attacks in the Modern Age

    We live in an era where simply clicking a video call link could lead to the digital equivalent of inviting a burglar in for tea—and hackers are getting increasingly creative with their invitations, especially when it comes to Microsoft 365 access. The Evolving Art of Social Engineering (or: Why...
  17. Beware AI-Driven Scams: Why You Should Avoid Using Quick Assist for Remote Support

    Microsoft recently issued a stern warning to both Windows and Mac users that sounds more like a no-nonsense parent than a world-leading technology corporation: Don't use the Quick Assist app to let anyone “fix” your computer. It’s not because the app itself is suddenly crawling with bugs or...
  18. How Google Phishing Attacks Exploit Trust Using OAuth and Google Sites

    One recent morning, Nick Johnson did what many of us do: scanned his inbox, eyes glazed, sifting spam from signal. Then he spotted what looked like a run-of-the-mill Google security alert—legit sender address, DKIM check passed, sorted neatly with his real security alerts. The message: Google...
  19. Protect Yourself from QR Code Scams: Tips & Security Strategies for Safe Scanning

    They beckon seductively from restaurant tabletops, leap out at us from bus ads, and dangle from the bottom of suspicious emails like a worm on a fishing line—QR codes, those enigmatic square mazes of pixels, are now as much a fixture of daily life as the coffee-ring stains around them. Yet...
  20. Cybersecurity Alert 2025: The Rise of SVG Phishing and How to Protect Your 2FA

    Security warnings can sometimes feel like the digital equivalent of that friend who’s always convinced they’ve forgotten to lock the front door. But this time, you’d be wise to double-check those bolts and deadlocks. As the world reels from a new spike in cyberattacks targeting the very tool we...