• Business
  • Entertainment
  • Health
  • News
  • Sport
  • Tech
  • World
Newsy Today
news of today
Home - Multi-factor authentication (MFA)
Tag:

Multi-factor authentication (MFA)

Tech

Barracuda spots 7 million device code phishing attacks

by Chief Editor April 24, 2026
written by Chief Editor

The Industrialization of Identity Theft: The PhaaS Evolution

The landscape of cybercrime is shifting from manual, targeted attacks to a highly scalable business model. The emergence of Phishing-as-a-Service (PhaaS) platforms, such as the EvilTokens kit, allows low-skill criminals to launch sophisticated campaigns that were once the sole domain of advanced threat actors.

This “industrialization” means that high-volume attacks are now easier to execute. For example, security firm Barracuda recently detected over 7 million device code phishing attacks within a single four-week window. By packaging complex exploits into ready-to-use kits sold on platforms like Telegram, the barrier to entry for attackers has vanished.

Did you recognize? Device code phishing is particularly dangerous since it doesn’t rely on fake login pages. Instead, it tricks users into using the legitimate Microsoft login portal, making it nearly invisible to traditional “spot the fake URL” training.

Beyond the Password: The Shift to Token Hijacking

For years, security training focused on preventing credential theft. However, we are seeing a strategic pivot toward hijacking trusted authentication flows. Instead of stealing a password, attackers are now targeting OAuth 2.0 access and refresh tokens.

View this post on Instagram about Microsoft, Phishing
From Instagram — related to Microsoft, Phishing

By abusing the device authorization flow—originally designed for devices with limited interfaces like printers or smart TVs—attackers can gain authorized access to Microsoft 365 and Entra ID environments. Once a victim enters a legitimate code on a real Microsoft page, the attacker receives the token directly.

This method provides three critical advantages for the attacker:

  • Stealth: No cloned websites are used, bypassing many email filters.
  • MFA Bypass: Because the victim authorizes the device themselves, multifactor authentication (MFA) and conditional access checks are often bypassed.
  • Persistence: Refresh tokens can grant attackers access for days or weeks, remaining effective even if the user changes their password.

The Next Frontier: Cross-Platform Expansion

While current surges heavily target Microsoft ecosystems, the trend is moving toward cross-platform versatility. The developers behind the EvilTokens kit have already indicated plans to extend their phishing capabilities to include Gmail and Okta phishing pages.

How fast is a BARRACUDA ATTACK? FREE CODE FRIDAY : DIGITAL CODES Magic Mike 7th son

This suggests a future where “identity-agnostic” phishing kits can pivot between different cloud providers depending on the target’s infrastructure. We are already seeing diverse threat actors—including Russian groups like Storm-237, UTA032, UTA0355, UNK_AcademicFlare, and TA2723, as well as the ShinyHunters data extortion group—leveraging these advanced techniques.

Pro Tip: To mitigate this risk, organizations should implement layered security controls, including advanced email filtering and continuous monitoring of identity protection mechanisms. Tighter controls around device authorization flows are essential to stop token abuse.

Redefining the Human Firewall

The rise of device code phishing renders traditional “look for the padlock” or “check the domain” advice obsolete. Since the final step of the attack happens on a genuine site (such as microsoft.com/devicelogin), the battle has shifted from technical detection to contextual awareness.

Future security training must move beyond identifying “fake” sites and instead teach users to question the reason for a request. If a user is asked to enter a verification code for a device they didn’t intentionally link, it should be treated as a critical red flag, regardless of how legitimate the website appears.

Attackers are increasingly tailoring their lures to specific roles. Recent campaigns have used PDFs, HTML, and DOCX files impersonating financial documents, payroll notices, or SharePoint shares to target employees in HR, finance, logistics, and sales.

Frequently Asked Questions

What is device code phishing?
It’s an attack that abuses the OAuth 2.0 device authorization flow. Attackers trick users into entering a legitimate device code on an official login page, which grants the attacker an access token to the user’s account.

Can MFA stop device code phishing?
Not necessarily. Because the victim is the one performing the authentication on a trusted device, they effectively “approve” the attacker’s session, potentially bypassing MFA and conditional access checks.

What is EvilTokens?
EvilTokens is a Phishing-as-a-Service (PhaaS) kit that automates device code phishing attacks, primarily targeting Microsoft 365 and Entra ID environments.

How do I protect my organization?
Implement layered security, use advanced email filtering, monitor for unusual identity patterns, and train staff to never enter device codes unless they initiated the request themselves.


Are you confident in your current identity protection strategy? Share your thoughts in the comments below or subscribe to our newsletter for the latest updates on evolving cyber threats.

April 24, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Microsoft patches major SQL Server flaw in March update

by Chief Editor March 13, 2026
written by Chief Editor

March 2026 Patch Tuesday: A Deep Dive into Microsoft’s Latest Security Updates

Microsoft’s March 2026 Patch Tuesday addressed a substantial 77 security vulnerabilities across its product suite, with a notable focus on SQL Server. This release included fixes for two zero-day vulnerabilities that were publicly known before patches were available, though currently, there’s no evidence of widespread exploitation.

SQL Server Under Scrutiny: CVE-2026-21262

The most critical update centers around CVE-2026-21262, an elevation-of-privilege vulnerability impacting a wide range of SQL Server versions, from the latest 2025 release all the way back to SQL Server 2016 Service Pack 3. While the vulnerability has a CVSS v3 base score of 8.8 – just shy of “critical” – the potential impact is significant. An attacker with low-level privileges could potentially escalate to sysadmin-level rights over the database engine across a network.

According to Rapid7’s Lead Software Engineer, Adam Barnett, this isn’t a typical SQL Server patch. The ability to gain sysadmin access over a network is a serious concern. Despite Microsoft rating exploitation as less likely, the public disclosure of the vulnerability increases the urgency for administrators to apply the patch.

Even organizations that don’t directly expose SQL Server to the internet are at risk. Internet scanning reveals a considerable number of accessible SQL Server instances, amplifying the potential impact should reliable exploits emerge. Successful exploitation could allow attackers to access or alter data and potentially pivot to the underlying operating system using features like xp_cmdshell, which, while disabled by default, can be re-enabled by a sysadmin.

.NET Denial-of-Service Vulnerability (CVE-2026-26127)

Another key vulnerability addressed this month is CVE-2026-26127, affecting .NET applications and potentially leading to denial-of-service (DoS) conditions. Public disclosure of this vulnerability has also occurred. Exploitation could cause service crashes, creating brief windows where monitoring and security tools are offline, potentially allowing attackers to evade detection.

Repeated exploitation, even by less sophisticated attackers, could disrupt online services and lead to breaches of service-level agreements.

Authenticator App Vulnerability (CVE-2026-26123)

Microsoft also patched a vulnerability in the Microsoft Authenticator mobile app for iOS and Android (CVE-2026-26123). This flaw, related to custom URL schemes and improper authorisation, could allow a malicious app to impersonate Microsoft Authenticator and intercept authentication information, potentially leading to account compromise. While requiring user interaction – specifically, choosing a malicious app to handle the sign-in flow – Microsoft considers this an important vulnerability.

Organizations managing mobile devices should review app installation policies and default handler settings for authentication apps to restrict potentially harmful sign-in flows.

End of Life for SQL Server 2012 Parallel Data Warehouse

Beyond security patches, Microsoft announced the end of extended support for SQL Server 2012 Parallel Data Warehouse at the end of March. Customers continuing to use this platform will no longer receive security updates, leaving them vulnerable to potential exploits.

Future Trends in Vulnerability Management

These updates highlight several emerging trends in vulnerability management. The increasing speed of public disclosure before patches are available is a major concern. Attackers are actively scanning for vulnerabilities and sharing information, reducing the window of opportunity for defenders. This necessitates a shift towards proactive threat hunting and robust intrusion detection systems.

The focus on vulnerabilities in authentication mechanisms, like the Microsoft Authenticator app, underscores the growing importance of securing identity and access management (IAM) systems. Multi-factor authentication is becoming increasingly prevalent, making these applications prime targets for attackers.

The continued patching of older SQL Server versions, even those nearing end-of-life, demonstrates the long-tail challenge of maintaining security in complex environments. Organizations must prioritize patching critical vulnerabilities across all systems, regardless of age, and consider implementing compensating controls where patching is not immediately feasible.

Did you know?

Publicly disclosed vulnerabilities, even without known exploits, significantly increase the risk of attack. Attackers actively monitor vulnerability databases and security blogs for new disclosures.

FAQ

Q: What is Patch Tuesday?
A: Patch Tuesday is the unofficial name for the regular schedule when Microsoft releases security updates for its products.

Q: What is a zero-day vulnerability?
A: A zero-day vulnerability is a flaw that is unknown to the vendor and for which no patch is available, giving attackers a window of opportunity to exploit it.

Q: What is the CVSS score?
A: The Common Vulnerability Scoring System (CVSS) is an industry standard for assessing the severity of software vulnerabilities.

Q: Should I patch all vulnerabilities immediately?
A: Prioritize patching based on the severity of the vulnerability, the potential impact to your organization, and the availability of exploits.

Q: What is xp_cmdshell?
A: xp_cmdshell is a stored procedure in SQL Server that allows execution of operating system commands.

Pro Tip: Regularly scan your network for vulnerable systems and prioritize patching based on risk assessment.

Stay informed about the latest security threats and updates by subscribing to security advisories and following reputable security blogs. Proactive vulnerability management is essential for protecting your organization from cyberattacks.

March 13, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Gen Z & Millennials face higher social media compromises

by Chief Editor January 13, 2025
written by Chief Editor

The Rising Tide of Cybersecurity: What Future Trends Build on Current Challenges

Social Media Vulnerabilities and Generational Gaps

With nearly half of Gen Z and Millennials reporting compromised social media credentials, cybersecurity’s chasm between generations has never been more apparent. Diverse cybersecurity habits are driving this disparity, as younger generations, despite being frequent targets, adapt more swiftly to emerging security technologies. According to Yubico’s 2024 survey, the landscape is rapidly evolving, with Gen Z and Millennials increasingly leveraging hardware security keys instead of traditional passwords, a trend less evident in older generations.

Future Shifts in Cybersecurity Practices

The current trajectory points towards a decrease in reliance on simple username-password combinations, as multi-factor authentication (MFA) becomes the new norm. Experts like Ronnie Manning from Yubico suggest that this shift is driven by growing awareness of cyber threats, especially among Millennials and Gen Z. A recent study highlights that nearly 90% of organizations expect to adopt MFA by the end of this year, reflecting this transformation (Security Today).

Real-Life Examples of Advanced Security Adoption

Consider the example of Twilio, a communications platform which transitioned to mandatory MFA for all employees just last year. This move not only enhanced security but also demonstrated Twilio’s commitment to safeguarding user data. This proactive approach underscores a broader industry trend where businesses are investing in sophisticated security measures to mitigate evolving threats.

Proactive Measures for Individuals

Derek Hanson of Yubico recommends actions individuals can take to fortify their security in 2025. Transitioning to hardware security keys, like YubiKey, could protect accounts from phishing attacks. These keys provide a robust form of authentication, unhackable by password theft alone. For those interested in learning more, our article on YubiKey and its Benefits is a great start.

Additionally, vigilance in communication remains important. Always verify email and message sender authenticity to prevent scams. If uncertain about an email’s legitimacy, directly contacting the organization can clarify. Student data protection case studies further enrich this discussion (National Center for Education Statistics).

Building a Secure Future

As cyber threats grow more sophisticated, increased cybersecurity education and robust authentication methods are crucial. The rise of passkeys and similar technology can enhance security across both personal and business domains. Businesses are encouraged to adopt these secure solutions for enhanced protection, and individuals can look to understand better the benefits of using password managers.

FAQ: Addressing Common Concerns

Q: How effective are hardware security keys compared to passwords?

A: Hardware security keys are highly effective because they require physical possession for access, making them resistant to phishing and other remote-based attacks.

Q: What are some best practices for protecting data?

A: Utilize MFA, regularly update software, be wary of unexpected communications, and use password managers to keep credentials secure.

Did You Know?

Hardware security keys can work with over 4,000 apps and services. Explore more about secure authentication tools at Security Insider.

The Path Forward: Engaging with Cybersecurity

As we peer into the cybersecurity future, staying informed and vigilant remains paramount. Businesses and individuals must embrace new security paradigms to thwart increasingly sophisticated threats. What measures are you taking to enhance your cybersecurity?

Comment below with your thoughts or visit our blog for more insights on trending cybersecurity topics. Don’t forget to subscribe to our newsletter for the latest updates!

January 13, 2025 0 comments
0 FacebookTwitterPinterestEmail

Recent Posts

  • Inside the money machine of online casinos and gaming platforms turning play into profit

    May 5, 2026
  • Readers Speak: Vessel seizures top Hormuz risk

    May 4, 2026
  • All-you-can-drink Bali resort kids will go gaga over

    May 4, 2026
  • US to Assist Ships Trapped in Strait of Hormuz

    May 4, 2026
  • Trump: US to Assist Stuck Ships in Strait of Hormuz

    May 4, 2026

Popular Posts

  • 1

    Maya Jama flaunts her taut midriff in a white crop top and denim jeans during holiday as she shares New York pub crawl story

    April 5, 2025
  • 2

    Saar-Unternehmen hoffen auf tiefgreifende Reformen

    March 26, 2025
  • 3

    Marta Daddato: vita e racconti tra YouTube e podcast

    April 7, 2025
  • 4

    Unlocking Success: Why the FPÖ Could Outperform Projections and Transform Austria’s Political Landscape

    April 26, 2025
  • 5

    Mecimapro Apologizes for DAY6 Concert Chaos: Understanding the Controversy

    May 6, 2025

Follow Me

Follow Me
  • Cookie Policy
  • CORRECTIONS POLICY
  • PRIVACY POLICY
  • TERMS OF SERVICE

Hosted by Byohosting – Most Recommended Web Hosting – for complains, abuse, advertising contact: o f f i c e @byohosting.com


Back To Top
Newsy Today
  • Business
  • Entertainment
  • Health
  • News
  • Sport
  • Tech
  • World