Laptop with Microsoft 365 login and attacker overlay capturing session token

AiTM Phishing: How Attackers Use Session-Token Theft To Bypass MFA In Microsoft 365 — Detection And Prevention

Explore how AiTM phishing and session-token theft allow attackers to bypass Microsoft 365 MFA, why standard OTP methods fail, and which telemetry signals indicate compromise. This technical guide gives security teams practical detection queries, containment steps, and prevention controls—deployable playbooks to neutralize active AiTM campaigns and harden identity posture.

WhatsApp Issues Emergency Patch for CVE-2025-55177 Affecting iOS and macOS Linked‑Device Sync

WhatsApp Issues Emergency Patch for CVE-2025-55177 Affecting iOS and macOS Linked‑Device Sync What happened WhatsApp issued an emergency update for its iOS and macOS clients to remediate a high‑severity vulnerability the company said may have been used in targeted zero‑day attacks. According to WhatsApp, the bug — tracked as CVE‑2025‑55177 and assigned a CVSS score…

VS Code Marketplace Flaw Lets Attackers Reuse Deleted Extension Names, Researchers Warn

VS Code Marketplace Flaw Lets Attackers Reuse Deleted Extension Names, Researchers Warn Summary of the discovery Security researchers at ReversingLabs identified a loophole in the Visual Studio Code Marketplace that can be abused to republish extensions using the same names as previously removed packages. ReversingLabs reported the finding after it observed a malicious extension called…

VS Code Marketplace Flaw Lets Attackers Republish Names of Deleted Extensions

VS Code Marketplace Flaw Lets Attackers Republish Names of Deleted Extensions Summary of the finding Security researchers at ReversingLabs reported a weakness in the Visual Studio Code (VS Code) Marketplace that permitted actors to reuse the names of extensions that had previously been removed. The discovery followed the identification of a malicious extension named “ahbanC.shiba”…

Storm-0501 Abuses Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Extortion Campaign

Storm-0501 Abuses Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Extortion Campaign Summary of the incident Recent reporting identifies a financially motivated threat actor tracked as Storm-0501 refining tactics to target hybrid cloud environments. The actor has been observed abusing Microsoft Entra ID (formerly Azure Active Directory) to gain access to Azure…

Cyberattack on Miljödata Disrupts Services Across More Than 200 Swedish Municipalities

Cyberattack on Miljödata Disrupts Services Across More Than 200 Swedish Municipalities What happened An attack targeting Miljödata, an IT-systems supplier used by roughly 80% of Sweden’s municipalities, has caused accessibility problems in more than 200 municipal regions, according to reporting by BleepingComputer. The supplier’s systems support a wide range of municipal IT services; the incident…

DNS Tunneling Detection With Microsoft Sentinel: Spot Unusual NXDOMAIN, Long FQDNs, Base64 Patterns, Beaconing And Convert Sigma To KQL For Network Security Monitoring

Learn practical techniques to detect DNS tunneling and data exfiltration using Microsoft Sentinel. This guide shows how to spot unusual NXDOMAIN responses, long FQDNs, base64-like patterns and beaconing behavior, and includes Sigma-to-KQL guidance for fast deployment in network security monitoring. Take action now to harden your DNS telemetry and hunting playbooks.