Cyber Defense Advisors

News

What C-Suite Leaders Need to Know About XDR

Considering adopting extended detection and response (XDR) in your cybersecurity defense program? Here’s what you need to know about the technology platform.

Cyber News, Cyber Threat Trends

What C-Suite Leaders Need to Know About XDR

Considering adopting extended detection and response (XDR) in your cybersecurity defense program? Here’s what you need to know about the technology platform.

Cyber News, Cyber Threat Trends

What C-Suite Leaders Need to Know About XDR

Considering adopting extended detection and response (XDR) in your cybersecurity defense program? Here’s what you need to know about the technology platform.

Cyber News, Cyber Threat Trends

What C-Suite Leaders Need to Know About XDR

Considering adopting extended detection and response (XDR) in your cybersecurity defense program? Here’s what you need to know about the technology platform.

Cyber News, Cyber Threat Trends

What C-Suite Leaders Need to Know About XDR

Considering adopting extended detection and response (XDR) in your cybersecurity defense program? Here’s what you need to know about the technology platform.

Cyber News, Cyber Threat Trends

What C-Suite Leaders Need to Know About XDR

Considering adopting extended detection and response (XDR) in your cybersecurity defense program? Here’s what you need to know about the technology platform.

Cyber News, Cyber Threat Trends

What C-Suite Leaders Need to Know About XDR

Considering adopting extended detection and response (XDR) in your cybersecurity defense program? Here’s what you need to know about the technology platform.

Cyber News, Cyber Threat Trends

Scarleteel Threat Targets AWS Fargate, Launches DDoS and Cryptojacking Campaigns

The Scarleteel threat targets AWS Fargate environments for data theft and more malicious types of attacks such as cryptojacking and DDoS. Learn how to mitigate this threat.

Cyber News, Cyber Threat Trends
  • by
  • July 17, 2023

Microsoft Bug Allowed Hackers to Breach Over Two Dozen Organizations via Forged Azure AD Tokens

Microsoft on Friday said a validation error in its source code allowed for Azure Active Directory (Azure AD) tokens to be forged by a malicious actor known as Storm-0558 using a Microsoft account (MSA) consumer signing key to breach two dozen organizations. “Storm-0558 acquired an inactive MSA consumer signing key and used it to forge authentication tokens […]

Cyber News, Cyber Threat Trends