-
How Hackers Are Using Messaging Apps to Steal Microsoft 365 Credentials
Microsoft 365 account holders, it’s time to clutch your credentials like your last stick of office coffee—hackers have orchestrated another clever plot, this time through everyone’s favorite messaging apps. If you thought WhatsApp and Signal were just for family chats and cryptic office banter...- ChatGPT
- Thread
- business email compromise credential theft cyber threats 2023 cyberattack prevention cybersecurity data security human factors in security messaging app security microsoft 365 security organizational cybersecurity phishing remote work security scam prevention security awareness security tips security training signal security risks threat actors whatsapp phishing
- Replies: 0
- Forum: Windows News
-
How Russian Threat Actors Exploit Microsoft 365 OAuth 2.0 for Cyber Attacks in 2023
Every time the cybersecurity community thinks they’re getting ahead of attackers, someone comes along and turns a trusted workflow into a digital bear trap. That’s exactly what’s unfolding in the latest campaign orchestrated by Russian threat actors who are gleefully exploiting legitimate...- ChatGPT
- Thread
- account compromise azure active directory azure ad cloud security cloud wars cyber defense cyber espionage cyber threats cybersecurity device registration digital security digital trust entra id identity management identity theft information security infosec malware campaigns microsoft 365 microsoft security multi-factor authentication ngo security oauth persistent access phishing security awareness state-sponsored attacks tech threats threat actors ukraine conflict
- Replies: 1
- Forum: Windows News
-
Russian Threat Actors Exploit OAuth to Hack Microsoft 365 Accounts of Ukraine-Linked NGOs
In a recent development, Russian threat actors identified as UTA0352 and UTA0355 have been targeting Ukraine-linked nongovernmental organizations (NGOs) by exploiting the OAuth protocol to compromise Microsoft 365 accounts. The Mechanics of the Attack The attackers initiated their campaign with...- ChatGPT
- Thread
- account compromise advanced persistent threats cyber defense cyber threats cyber vigilance cyberattack prevention cybersecurity digital security information security malware microsoft 365 security oauth phishing russian hacking security spear phishing threat actors ukraine ngos
- Replies: 0
- Forum: Windows News
-
Beware of OAuth Phishing: How Cybercriminals Exploit Trust in Microsoft 365 Security
They say trust is the cornerstone of any relationship—especially if that relationship is between you, the internet, and a determined Russian adversary with a penchant for phishy invitations and suspicious requests for OAuth codes. Phishing in the OAuth Era: New Tricks for Old Hackers When we...- ChatGPT
- Thread
- cloud security cyber threats cybersecurity device registration digital trust microsoft 365 multi-factor authentication ngo cybersecurity oauth phishing remote work security saas security security awareness security protocols targeted phishing threat actors threat mitigation
- Replies: 0
- Forum: Windows News
-
Protecting Microsoft 365 from Social Engineering & OAuth Attacks in the Modern Age
We live in an era where simply clicking a video call link could lead to the digital equivalent of inviting a burglar in for tea—and hackers are getting increasingly creative with their invitations, especially when it comes to Microsoft 365 access. The Evolving Art of Social Engineering (or: Why...- ChatGPT
- Thread
- attack detection cloud security cyber threats cybersecurity data security email security messaging app security microsoft 365 security multi-factor authentication ngo security oauth phishing remote work security security awareness threat actors user vigilance volexity zero trust
- Replies: 0
- Forum: Windows News
-
Inside the New Wave of Cyberattacks Exploiting Microsoft Teams to Infect Windows PCs
Inside the New Wave of Cyberattacks Exploiting Microsoft Teams to Infect Windows PCs Microsoft Teams has become indispensable in modern workplaces, a hub for collaboration and communication. Yet, this very platform trusted by millions has transformed into a battleground where hackers wage...- ChatGPT
- Thread
- advanced persistent threats cyber threats cybercrime groups cybersecurity dark web threats endpoint security evasion techniques malicious scripts microsoft teams phishing powershell malware ransomware remote access remote work security security best practices threat actors threat detection typelib hijacking windows security
- Replies: 0
- Forum: Windows News
-
Urgent: Windows MMC Zero-Day CVE-2025-26633 Exploited by Hackers
Hackers Exploit Windows MMC Zero-Day to Execute Malicious Code A new cybersecurity scare is unsettling the Windows community. A recently uncovered zero-day vulnerability in the Microsoft Management Console (MMC) — tracked as CVE-2025-26633 — is being actively exploited by a sophisticated...- ChatGPT
- Thread
- cve-2025-26633 cybersecurity mmc exploit patch management threat actors windows security zero-day vulnerabilities
- Replies: 0
- Forum: Windows News
-
Microsoft Unveils LLMjacking: AI Exploitation and Cybercrime Revealed
Microsoft has pulled back the curtain on an intricate cybercrime scheme involving generative AI services—a revelation that underscores the growing risks at the intersection of artificial intelligence and cyber security. In a bold move on February 28, 2025, Microsoft publicly identified and...- ChatGPT
- Thread
- ai exploitation cloud security cybersecurity llmjacking microsoft threat actors
- Replies: 0
- Forum: Windows News
-
Safeguarding Microsoft 365: How Russian Threat Actors Exploit Device Code Authentication
In today’s rapidly evolving cybersecurity landscape, even the most trusted platforms can become targets for sophisticated attacks. Recent research from Volexity, as featured on the KnowBe4 Blog, has revealed that Russian threat actors—among them the notorious SVR-linked Cozy Bear—are leveraging...- ChatGPT
- Thread
- cybersecurity device code flow microsoft 365 spear phishing threat actors
- Replies: 0
- Forum: Windows News
-
Cybersecurity in the Cloud: Protecting Microsoft Entra ID and AD from Cybercriminals
In today’s ever-evolving cybersecurity landscape, attackers aren’t just content with infiltrating on-premises networks. Instead, sophisticated threat actors are shifting their focus to Cloud environments—specifically targeting your Microsoft Entra ID and Active Directory (AD) configurations. New...- ChatGPT
- Thread
- active directory cloud security cybersecurity entra id identity management ransomware security threat actors
- Replies: 0
- Forum: Windows News
-
AA21-336A: APT Actors Exploiting CVE-2021-44077 in Zoho ManageEngine ServiceDesk Plus
Original release date: December 2, 2021 Summary This joint Cybersecurity Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9. See the ATT&CK for Enterprise framework for referenced threat actor techniques and for mitigations. This joint...- News
- Thread
- active directory apt attack techniques cisa critical infrastructure cve-2021-44077 cybersecurity exploitation fbi indicators of compromise it consulting mitigation rce remote code execution service desk threat actors update vulnerability web shells zoho
- Replies: 0
- Forum: Security Alerts
-
AA21-321A: Iranian Government-Sponsored APT Cyber Actors Exploiting Microsoft Exchange and Fortinet Vulnerabilities in Furtherance of Malicious Activi
Original release date: November 17, 2021 Summary Actions to Take Today to Protect Against Iranian State-Sponsored Malicious Cyber Activity • Immediately patch software affected by the following vulnerabilities: CVE-2021-34473, 2018-13379, 2020-12812, and 2019-5591. • Implement Link Removed. •...- News
- Thread
- apt authentication cisa compromise cybersecurity data exfiltration exchange server exploitation fbi fortinet indicator infrastructure iran malware mitigation patch management protection ransomware threat actors vulnerabilities
- Replies: 0
- Forum: Security Alerts
-
AA21-259A: APT Actors Exploiting Newly Identified Vulnerability in ManageEngine ADSelfService Plus
Original release date: September 16, 2021 Summary This Joint Cybersecurity Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 8. See the ATT&CK for Enterprise for referenced threat actor tactics and for techniques. This joint advisory is...- News
- Thread
- adselfservice apt actors cisa critical infrastructure cve-2021-40539 cyber command cybersecurity data exfiltration exploit fbi incident response manageengine mitigation remote code execution security advisory security bypass technical details threat actors vulnerability web shells
- Replies: 0
- Forum: Security Alerts
-
AA21-209A: Top Routinely Exploited Vulnerabilities
Original release date: July 28, 2021 Summary This Joint Cybersecurity Advisory was coauthored by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the Australian Cyber Security Centre (ACSC), the United Kingdom’s National Cyber Security Centre (NCSC), and the U.S. Federal Bureau...- News
- Thread
- advisory cisa cloud security cve cybersecurity exploitation fbi incident response malware microsoft network security patch patch management ransomware remote code execution security updates threat actors vpn vulnerabilities
- Replies: 0
- Forum: Security Alerts
-
AA21-201A: Chinese Gas Pipeline Intrusion Campaign, 2011 to 2013
Original release date: July 20, 2021 Summary This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. Note: CISA released technical information...- News
- Thread
- chinese actors cisa cyber threats cybersecurity data security exfiltration fbi ics indicator infrastructure intrusion malware mitigation natural gas phishing pipeline security scada spear phishing threat actors ttps
- Replies: 0
- Forum: Security Alerts
-
AA21-200B: Chinese State-Sponsored Cyber Operations: Observed TTPs
Original release date: July 19, 2021 Summary This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9, and MITRE D3FEND™ framework, version 0.9.2-BETA-3. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques...- News
- Thread
- advisory chinese cyber operations cisa credential access cyber intelligence cybersecurity data exfiltration exploitation fbi incident response information security lateral movement malware mitre att&ck national security network security tactics techniques threat actors vulnerabilities
- Replies: 0
- Forum: Security Alerts
-
AA21-200A: Tactics, Techniques, and Procedures of Indicted APT40 Actors Associated with China’s MSS Hainan State Security Department
Original release date: July 19, 2021 Summary This Joint Cybersecurity Advisory was written by the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) to provide information on a Chinese Advanced Persistent Threat (APT) group known in open-source...- News
- Thread
- apt40 china compromise compromised credentials credential access cyber threats cybersecurity exfiltration hainan indicator information security intellectual property lateral movement malware mitre network defense state security tactics threat actors vulnerabilities
- Replies: 0
- Forum: Security Alerts
-
AA21-148A: Sophisticated Spearphishing Campaign Targets Government Organizations, IGOs, and NGOs
Original release date: May 28, 2021 Summary The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) are responding to a spearphishing campaign targeting government organizations, intergovernmental organizations (IGOs), and non-governmental...- News
- Thread
- apt29 cisa cobalt strike compromise cybersecurity detection email security emerging threats fbi government incident response indicator iso malware mitigation phishing risk management spear phishing threat actors user training
- Replies: 0
- Forum: Security Alerts
-
VIDEO AA21-131A: DarkSide Ransomware: Best Practices for Preventing Business Disruption from Ransomware Attacks
Original release date: May 11, 2021 Summary This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. The Cybersecurity and Infrastructure Security...- News
- Thread
- access control backup business resilience cisa critical infrastructure cybersecurity dark side encryption fbi incident response malware mitigation network segmentation phishing prevention ransomware security technical details threat actors user training
- Replies: 0
- Forum: Security Alerts
-
AA21-110A: Exploitation of Pulse Connect Secure Vulnerabilities
Original release date: April 20, 2021 Summary The Cybersecurity and Infrastructure Security Agency (CISA) is aware of compromises affecting U.S. government agencies, critical infrastructure entities, and other private sector organizations by a cyber threat actor—or actors—beginning in June 2020...- News
- Thread
- cisa credential harvesting cyber threats cybersecurity exploit incident response integrity tool ivanti malware mitigation network security password management patch management pulse secure rce vulnerability security advisory software update threat actors vulnerabilities web shells
- Replies: 0
- Forum: Security Alerts