Generative Data Intelligence

Tag: Azure AD

Critical Vulnerability in VMware vSphere Plug-in Allows Session Hijacking

VMware is urging network administrators to remove an out-of-date plug-in for its VSphere, which has two flaws — one of them critical — that...

Top News

Microsoft ID Security Gaps That Let Threat Actor Steal Signing Key

Several security missteps on Microsoft's part allowed a China-based threat actor to forge authentication tokens and access user email from some 25 Microsoft enterprise...

Microsoft IDs Security Gaps that Let Threat Actors Steal Signing Key

Several security missteps on Microsoft's part allowed a China-based threat actor to forge authentication tokens and access user email from some 25 Microsoft enterprise...

Securing Your Legacy: Identities, Data, and Processes

Legacy systems are the bane of IT pros everywhere. "Legacy" generally is defined as outdated computer hardware and software that remains stubbornly in place...

BeyondTrust’s Identity Security Insights Provides Unprecedented Visibility into Identity Threats

Atlanta, GA – August 2, 2023 – BeyondTrust, the worldwide leader in intelligent identity and access security, today announced the general availability of its groundbreaking...

Senator Blasts Microsoft for Negligence in 365 Email Breach

The heads of the Justice Department, the Cybersecurity and Infrastructure Security Agency, and the Federal Trade Commission received a letter on July 27 from...

Senator Blasts Microsoft for Negligence in 365 Email Breach

The heads of the Justice Department, the Cybersecurity and Infrastructure Security Agency, and the Federal Trade Commission received a letter on July 27 from...

Microsoft 365 Breach Risk Widens to Millions of Azure AD Apps

The Storm-0558 breach that gave Chinese advanced persistent threat (APT) actors access to emails within at least 25 US government agencies could be much further-reaching...

Microsoft hit by Storm season – a tale of two semi-zero days

by Paul Ducklin At the tail-end of last week, Microsoft published a report entitled Analysis of Storm-0558 techniques for unauthorized...

Rogue Azure AD Guests Can Steal Data via Power Apps

Guest accounts in Azure AD (AAD) are meant to provide limited access to corporate resources for external third parties — the idea is to...

Chinese APT Cracks Microsoft Outlook Emails at 25 Government Agencies

This spring, a Chinese threat actor had access to email accounts across 25 government agencies in Western Europe and the US, including the State...

SpecterOps Closes Series A Extension From Ballistic Ventures, Bringing Funding Round Total to $33.5M

Seattle, WA – July 11, 2023 â€“ SpecterOps, a provider of adversary-focused cybersecurity solutions born out of unique insights of advanced threat actor tradecraft, today announced...

Exposure Management Looks to Attack Paths, Identity to Better Measure Risk

As companies struggle with finding and closing off the paths that attackers could use to infiltrate and compromise their IT environments, security providers are...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?