• Business
  • Entertainment
  • Health
  • News
  • Sport
  • Tech
  • World
Newsy Today
news of today
Home - Identity Security
Tag:

Identity Security

Tech

Barracuda spots 7 million device code phishing attacks

by Chief Editor April 24, 2026
written by Chief Editor

The Industrialization of Identity Theft: The PhaaS Evolution

The landscape of cybercrime is shifting from manual, targeted attacks to a highly scalable business model. The emergence of Phishing-as-a-Service (PhaaS) platforms, such as the EvilTokens kit, allows low-skill criminals to launch sophisticated campaigns that were once the sole domain of advanced threat actors.

This “industrialization” means that high-volume attacks are now easier to execute. For example, security firm Barracuda recently detected over 7 million device code phishing attacks within a single four-week window. By packaging complex exploits into ready-to-use kits sold on platforms like Telegram, the barrier to entry for attackers has vanished.

Did you recognize? Device code phishing is particularly dangerous since it doesn’t rely on fake login pages. Instead, it tricks users into using the legitimate Microsoft login portal, making it nearly invisible to traditional “spot the fake URL” training.

Beyond the Password: The Shift to Token Hijacking

For years, security training focused on preventing credential theft. However, we are seeing a strategic pivot toward hijacking trusted authentication flows. Instead of stealing a password, attackers are now targeting OAuth 2.0 access and refresh tokens.

View this post on Instagram about Microsoft, Phishing
From Instagram — related to Microsoft, Phishing

By abusing the device authorization flow—originally designed for devices with limited interfaces like printers or smart TVs—attackers can gain authorized access to Microsoft 365 and Entra ID environments. Once a victim enters a legitimate code on a real Microsoft page, the attacker receives the token directly.

This method provides three critical advantages for the attacker:

  • Stealth: No cloned websites are used, bypassing many email filters.
  • MFA Bypass: Because the victim authorizes the device themselves, multifactor authentication (MFA) and conditional access checks are often bypassed.
  • Persistence: Refresh tokens can grant attackers access for days or weeks, remaining effective even if the user changes their password.

The Next Frontier: Cross-Platform Expansion

While current surges heavily target Microsoft ecosystems, the trend is moving toward cross-platform versatility. The developers behind the EvilTokens kit have already indicated plans to extend their phishing capabilities to include Gmail and Okta phishing pages.

How fast is a BARRACUDA ATTACK? FREE CODE FRIDAY : DIGITAL CODES Magic Mike 7th son

This suggests a future where “identity-agnostic” phishing kits can pivot between different cloud providers depending on the target’s infrastructure. We are already seeing diverse threat actors—including Russian groups like Storm-237, UTA032, UTA0355, UNK_AcademicFlare, and TA2723, as well as the ShinyHunters data extortion group—leveraging these advanced techniques.

Pro Tip: To mitigate this risk, organizations should implement layered security controls, including advanced email filtering and continuous monitoring of identity protection mechanisms. Tighter controls around device authorization flows are essential to stop token abuse.

Redefining the Human Firewall

The rise of device code phishing renders traditional “look for the padlock” or “check the domain” advice obsolete. Since the final step of the attack happens on a genuine site (such as microsoft.com/devicelogin), the battle has shifted from technical detection to contextual awareness.

Future security training must move beyond identifying “fake” sites and instead teach users to question the reason for a request. If a user is asked to enter a verification code for a device they didn’t intentionally link, it should be treated as a critical red flag, regardless of how legitimate the website appears.

Attackers are increasingly tailoring their lures to specific roles. Recent campaigns have used PDFs, HTML, and DOCX files impersonating financial documents, payroll notices, or SharePoint shares to target employees in HR, finance, logistics, and sales.

Frequently Asked Questions

What is device code phishing?
It’s an attack that abuses the OAuth 2.0 device authorization flow. Attackers trick users into entering a legitimate device code on an official login page, which grants the attacker an access token to the user’s account.

Can MFA stop device code phishing?
Not necessarily. Because the victim is the one performing the authentication on a trusted device, they effectively “approve” the attacker’s session, potentially bypassing MFA and conditional access checks.

What is EvilTokens?
EvilTokens is a Phishing-as-a-Service (PhaaS) kit that automates device code phishing attacks, primarily targeting Microsoft 365 and Entra ID environments.

How do I protect my organization?
Implement layered security, use advanced email filtering, monitor for unusual identity patterns, and train staff to never enter device codes unless they initiated the request themselves.


Are you confident in your current identity protection strategy? Share your thoughts in the comments below or subscribe to our newsletter for the latest updates on evolving cyber threats.

April 24, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Tenable warns of widening AI exposure gap in cloud

by Chief Editor February 23, 2026
written by Chief Editor

The Widening AI Exposure Gap: Why Cloud Security is Falling Behind

Organisations are facing a growing cybersecurity challenge: an “AI exposure gap.” This isn’t about AI *causing* breaches, but rather the rapid integration of AI, cloud technologies, and third-party software creating vulnerabilities that security teams struggle to identify and address. A recent report from Tenable highlights this critical mismatch between engineering speed and security capabilities.

The Software Supply Chain: A Major Weak Point

The report reveals a significant risk within the software supply chain. A staggering 86% of organisations have third-party code packages installed containing critical-severity vulnerabilities. Even more concerning, 13% have deployed packages with a known history of compromise, including instances linked to the s1ngularity and Shai-Hulud worms. This demonstrates that vulnerabilities aren’t just theoretical; they’re actively being exploited.

The increasing use of AI and Model Context Protocol third-party packages – found in 70% of organisations – further complicates matters. These integrations often bypass traditional security oversight, embedding AI deeper into systems and expanding the attack surface.

Identity and Access Management: A Critical Control Point

Identity controls are proving to be a major pressure point. “Ghost” secrets – unused or unrotated cloud credentials – plague 65% of organisations. Alarmingly, 17% of these unused credentials grant critical administrative privileges. Nearly half (49%) of identities with excessive permissions remain dormant, representing a significant potential entry point for attackers.

The report also raises concerns about permissions granted to AI services themselves, with 18% of organisations giving them rarely-audited administrative access. Non-human identities, like AI agents and service accounts, now pose a higher risk (52%) than human users (37%), due to “toxic combinations” of permissions across fragmented systems.

The Rise of “Invisible” Exposure

Tenable defines this challenge as an issue of “exposure management” – the process of identifying, evaluating, and prioritizing risks across all potential attacker entry points. AI adoption dramatically expands the number of systems and components that can inherit risk, adding new layers to applications, infrastructure, identities, and data. This creates a largely invisible exposure that many security teams are ill-equipped to manage.

The report identified severe risks in four key areas: AI security posture, supply chain attack vectors, least-privilege implementation, and cloud workload exposure.

What Can Organisations Do?

The report recommends a multi-faceted approach. Improving visibility of AI integrations is paramount, alongside tightening identity-centric controls. Implementing least-privilege practices for AI roles, removing “ghost” identities, and eliminating exposure from static secrets are also crucial steps. Recognizing that third-party code and external accounts now function as extensions of an organisation’s infrastructure is vital.

Liat Hayun, Senior Vice President of Product Management and Research at Tenable, emphasizes the demand for security teams to proactively account for AI systems embedded within infrastructure. She states that a lack of visibility and governance leaves teams vulnerable to new exposures, including over-privileged identities in the cloud.

Hayun advocates for focusing on the “unified exposure path” to move beyond managing “security debt” and towards managing actual business risk.

Pro Tip

Regularly audit and rotate cloud credentials. Implement multi-factor authentication (MFA) wherever possible to add an extra layer of security.

Future Trends to Watch

The AI exposure gap isn’t a static problem; it’s likely to worsen as AI becomes more pervasive. Several trends will exacerbate the challenge:

  • Increased AI Complexity: AI models will develop into more complex, making it harder to understand their internal workings and potential vulnerabilities.
  • AI-Powered Attacks: Attackers will increasingly leverage AI to automate and refine their attacks, making them more sophisticated and tough to detect.
  • Expansion of Non-Human Identities: The number of AI agents and service accounts will continue to grow, increasing the risk associated with non-human identities.
  • Decentralized AI Development: More AI development will occur outside of centralized IT departments, leading to shadow AI and increased security risks.

FAQ

Q: What is the “AI exposure gap”?
A: It’s the growing mismatch between the speed of AI and cloud adoption and the ability of security teams to assess and remediate associated risks.

Q: How significant is the risk from third-party code?
A: 86% of organisations have third-party code packages with critical vulnerabilities, and 13% have deployed compromised packages.

Q: What is exposure management?
A: It’s the process of identifying, evaluating, and prioritizing risks across all potential attacker entry points.

Did you know?

Non-human identities (AI agents, service accounts) now present a higher risk profile than human users, according to Tenable’s research.

Want to learn more about securing your cloud environment? Explore our other articles on cloud security best practices.

February 23, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Securing Machine Identities in the AI and Automation Era

by Chief Editor May 20, 2025
written by Chief Editor

The Evolution of Machine Identities in AI and Automation

In recent years, the rapid adoption of artificial intelligence (AI) and automation technologies has significantly transformed the landscape of identity security. As companies pivot towards AI-driven operations, the concept of machine identities has become intrinsic to cybersecurity defenses. Machine identities, unlike human identities, demand rigorous management from their emergence to retirement. These identities are critical in enabling secure machine-to-machine communication and API integration across vast networks.

Through real-life scenarios, such as a financial institution implementing AI for fraud detection, we witness the heightened need for robust identity systems. These systems confront dynamic threats, emphasizing the importance of access controls and lifecycle management to thwart unauthorized access.

Innovative Approaches in Identity and Access Management (IAM)

The rise of advanced IAM solutions, like those offered by platforms involving secrets management tools such as Conjur, demonstrates how technology has evolved to meet the needs of modern infrastructure. These tools integrate within DevSecOps pipelines, providing just-in-time access and eliminating the vulnerabilities associated with static, long-term credentials.

A study in 2024 by Gartner highlighted a 40% increase in organizations adopting secrets management tools, suggesting a pivot towards automating IAM processes to bolster cybersecurity frameworks effectively.

AI’s Role in Thwarting Identity-Based Threats

As cybercriminals deploy AI-powered agents to exploit identity systems, defenders must employ similar technologies. Optiv’s approach encapsulates this strategy through the integration of AI-powered detection and response mechanisms. Leveraging AI not only helps in predicting potential threats but also in designing proactive defense strategies.

For instance, AI-powered systems capable of real-time anomaly detection help quickly identify and neutralize identity-based threats, resulting in a fortified security environment. As per a report by Forrester, companies using AI-driven security systems saw a reduction of 30% in their incident response time in 2023.

Criticality of API and Cloud Security

As businesses migrate services to the cloud, securing API hooks becomes more crucial than ever. The integration of comprehensive machine identity management solutions, like those offered by CyberArk and Optiv, underscores this need by providing robust mechanisms for permissions, secret management, and machine identity lifecycle oversight.

Organizations adopting integrated PKI management systems experienced a 25% improvement in their security posture, according to data from Deloitte’s 2024 Global Cloud Security Survey.

Frequently Asked Questions

What are machine identities?

Machine identities refer to the digital identifiers used by machines and software applications to authenticate and communicate securely with each other over networks.

Why is machine identity management critical?

Proper management is essential to prevent unauthorized access and potential compromise of organizational assets, ensuring that only legitimate entities can access and communicate within a network.

How does AI enhance identity management?

AI aids in automating detection and response processes, identifying patterns indicative of identity-based attacks, and optimizing access controls.

Pro Tips for Enhanced Identity Security

Did you know? Integrating AI into cybersecurity tools can lead to a 40% reduction in response times compared to conventional methods.

We hope this exploration into AI, automation, and identity security provides you with valuable insights. For further reading, explore our article on addressing machine identity challenges. Join the conversation in the comments below, or subscribe to our newsletter for more expert insights!

This HTML content is crafted to provide a structured and engaging exploration into the themes of AI, automation, and machine identity security. By blending informative content with interactive elements and strategic links, this article is designed to engage readers while providing value through practical insights and data-driven observations.

May 20, 2025 0 comments
0 FacebookTwitterPinterestEmail
Tech

Microsoft’s 2024 vulnerabilities hit record high, report says

by Chief Editor April 16, 2025
written by Chief Editor

Unpacking Microsoft’s Rising Vulnerability Landscape in 2024

The cybersecurity landscape is in constant flux, and 2024 has been no exception for Microsoft vulnerabilities. According to BeyondTrust’s detailed analysis, vulnerabilities have soared to an all-time high of 1,360, marking an 11% increase from 2022. This uptick signals a mounting necessity for robust security measures, especially in rapidly evolving tech environments.

Elevation of Privilege: A Persisting Threat

Elevation of Privilege vulnerabilities have continually dominated the scene, accounting for a significant 40% of all reported cases. This underscores the high value attackers place on gaining elevated access within systems. For example, in 2023, the SolarWinds attack exposed the tactical targeting of such vulnerabilities, emphasizing the critical need for vigilant systems design.

Security Feature Bypass Vulnerabilities: A Rising Concern

Security Feature Bypass vulnerabilities have surged by 60%, from 56 in 2023 to 90 in 2024. This trend reveals the pressing need for secure coding practices and proactive threat modeling. Implementing rigorous testing and development standards can mitigate these risks, aligning with best practices observed in secure software environments like those at Google and Apple.

Edge and Office: Specific Threat Zones

While critical vulnerabilities are declining overall, sector-specific threats, such as those targeting Microsoft Edge and Office, are on the rise. Microsoft Edge vulnerabilities rose by 17%, with nine deemed critical, compared to none in 2022. Similarly, Office vulnerabilities almost doubled, now totaling 62. These trends reflect the ongoing challenge of securing diverse software ecosystems. [internal-link-to-previous-article-on-microsoft-edge]

A Positive Turn for Microsoft’s Security Strategy?

The report’s outlook isn’t entirely bleak. The stabilization of vulnerability increases and decline in critical cases indicates that Microsoft’s security initiatives are bearing fruit. Enhanced security architecture in operating systems has contributed to this trend, showing potential pathways for other tech companies. It’s vital for organizations to regularly review and update their security protocols, akin to practices seen at Microsoft Azure.

The Complexity of Contemporary Ecosystems

Modern technology landscapes, with their layers of cloud and AI services, present intricate security challenges. Although Microsoft’s tech stack is expanding, each new technology introduces fresh vulnerabilities. Cybersecurity experts often draw parallels with Amazon’s AWS vulnerabilities as cautionary examples of technology-driven attack surfaces.

Proactive Measures for the Future

Going forward, the reliance on patches alone won’t suffice, as evidenced by instances where patches inadvertently introduce new stability risks. A layered defense strategy is imperative. This approach mirrors the methodologies deployed in high-security projects such as the NSA’s Red Team exercises.

Shifts in Attack Strategies

Current trends show that threat actors are focusing more intensively on identities and privileges. The shift from traditional exploits to identity attacks demands comprehensive defenses targeting the privileged access paths within organizations. Tools like those from BeyondTrust offer insights into securing these pathways effectively.

James Maude’s Warning

Reflecting on this, James Maude of BeyondTrust stresses the critical nature of the evolving threat landscape, highlighting how attackers continuously update their strategies. This evolution demands a dynamic security posture, combining patching with other robust strategies to close the paths to privilege. [external-link-to-BeyondTrust-report]

Frequently Asked Questions

What are the key trends in Microsoft vulnerabilities? Why should organizations be concerned?

Key trends include the rise in Elevation of Privilege and Security Feature Bypass vulnerabilities, as well as sector-specific increases in Edge and Office threats. Organizations need to be vigilant because these vulnerabilities can be exploited by attackers to gain unauthorized access or bypass security measures.

How can organizations mitigate these vulnerabilities?

Organizations can mitigate vulnerabilities by adopting a layered defense strategy, integrating secure coding practices, conducting regular audits, and securing privileged access paths. Going beyond patches to include proactive threat modeling will be key.

What role does identity play in modern cybersecurity threats?

Identity attacks have become increasingly popular among cyber adversaries. These attacks focus on exploiting privileged access and identities to infiltrate systems and move laterally within networks.

Did You Know?

Recent studies show that 80% of breaches involve a privileged access misuse, making identity security a top priority across industries (source: [credible-survey-source]).

Pro Tips

Adopt a zero-trust architecture to minimize risks associated with elevation of privilege and identity attacks. Regularly update and monitor security access protocols to stay ahead of evolving threats.

Further Engagement

We invite curious cybersecurity enthusiasts to comment below with their insights or concerns regarding these trends. Don’t forget to explore our [internal-link-to-related-article] on advanced threat protection strategies and subscribe to our newsletter for the latest expert advice and updates.

April 16, 2025 0 comments
0 FacebookTwitterPinterestEmail

Recent Posts

  • Ukraine Hits Russian Shadow Fleet Oil Tankers in Black Sea

    May 3, 2026
  • Texas Plane Crash Kills Entire Pickleball Team

    May 3, 2026
  • KBO: Clutch Foreign Home Runs Power Samsung, Lotte and kt to Victory

    May 3, 2026
  • Ali Koleilat: Biografie en Levensloop

    May 3, 2026
  • Cole Tomas Allen challenges restrictive suicide precautions in federal court

    May 3, 2026

Popular Posts

  • 1

    Maya Jama flaunts her taut midriff in a white crop top and denim jeans during holiday as she shares New York pub crawl story

    April 5, 2025
  • 2

    Saar-Unternehmen hoffen auf tiefgreifende Reformen

    March 26, 2025
  • 3

    Marta Daddato: vita e racconti tra YouTube e podcast

    April 7, 2025
  • 4

    Unlocking Success: Why the FPÖ Could Outperform Projections and Transform Austria’s Political Landscape

    April 26, 2025
  • 5

    Mecimapro Apologizes for DAY6 Concert Chaos: Understanding the Controversy

    May 6, 2025

Follow Me

Follow Me
  • Cookie Policy
  • CORRECTIONS POLICY
  • PRIVACY POLICY
  • TERMS OF SERVICE

Hosted by Byohosting – Most Recommended Web Hosting – for complains, abuse, advertising contact: o f f i c e @byohosting.com


Back To Top
Newsy Today
  • Business
  • Entertainment
  • Health
  • News
  • Sport
  • Tech
  • World