Tag:
Microsoft
cyber security
Midnight Blizzard’s Microsoft Corporate Email Hack Threatens Federal Agencies: CISA Warns
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive concerning a breach in Microsoft's corporate email system.The directive, ED 24-02,...
Cloud
New OilRig Downloaders Abusing Microsoft Cloud APIs for C&C Communications
Threat actors engage in cyberespionage to gain the following advantages:-StrategicPoliticalEconomicMilitaryHackers do so by stealing the following key things from the targeted organizations or nations:-Confidential...
Cyber Security News
Octo Tempest Attacking Organizations to Steal Financial Data
Microsoft has been closely monitoring the Octo Tempest, a significant financial threat organization. This threat group employs various strategies and TTPs for worldwide extortion, making...
Cyber Security News
Microsoft to Kill NTLM and Expand Kerberos Authentication
Robust security measures are paramount in an ever-changing digital landscape. As Windows adapts to meet the evolving demands of our world, user multi factor...
Cyber Security News
ToddyCat APT Hackers Exploiting Vulnerable Microsoft Exchange Servers
ToddyCat, a highly skilled advanced persistent threat (APT) actor notorious for launching targeted attacks in Europe and Asia, has recently upgraded its arsenal of...
Cyber Attack
Hackers Hijacking Microsoft SQL Servers to Compromise Azure Environments
Hackers frequently target Microsoft SQL servers because of their extensive use and possible weaknesses. These servers are a top target for hackers looking to make...
Cyber Security News
Microsoft Teams as a Tool for Storm-0324 Threat Group to Hack Corporate Networks
According to recent reports, a threat actor known as Storm-0324 has been using email-based initial infection vectors to attack organizations.However, as of July...
Cyber Security News
Chinese Hack of Microsoft Consumer Key Stemmed From its Engineer’s Corporate Account
Storm-0558, a threat actor based in China, has recently gained access to a Microsoft account consumer key. This has allowed them to infiltrate and...