Skip to content
Threat Digest
Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware
Nation-State Threats Security Tools Compliance & Policy Cloud Security Threat Intelligence

#mfa-bypass

Diagram showing the ConsentFix v3 attack flow with automated components.
Cloud Security

ConsentFix v3 Hits Azure: What It Means for You

Forget passwords. The latest Azure attack, ConsentFix v3, hijacks accounts through automated OAuth abuse, a chilling escalation for cloud security.

5 min read 3 weeks ago
Dark hacker lair with glowing AI interfaces generating phishing emails and malware code
Threat Intelligence

AI: From Cybercriminal Sidekick to Attack Factory Floor

Picture a hacker's dimly lit room, screens flickering as AI spits out hyper-personalized phishing emails in seconds. Threat actor abuse of AI isn't hype—it's turning old-school scams into precision strikes.

4 min read 1 month, 1 week ago
ShinyHunters hackers using vishing to target SaaS SSO credentials
Threat Intelligence

ShinyHunters' Vishing Rampage Hits 20+ SaaS Firms: Mandiant's No-BS Defense Playbook

ShinyHunters just bragged about breaching over 20 SaaS companies via slick vishing. Mandiant's got the playbook to shut them down—before your data's next on BreachForums.

5 min read 1 month, 1 week ago
Sneaky QR code in VENOM phishing email targeting C-suite Microsoft logins
Threat Intelligence

VENOM Phishing: Execs' Microsoft Logins in Crosshairs

VENOM phishing attacks are laser-focused on stealing senior execs' Microsoft logins. Forget basic MFA; this PhaaS nightmare demands real defenses.

4 min read 1 month, 1 week ago
🛡️
Security Tools

Wearable Biometrics Finally Fix Stolen Credential Hell

Attackers with your creds laugh at MFA prompts. Wearable biometrics flip the script, proving you're you—right now, on your wrist.

5 min read 1 month, 1 week ago
Digital illustration of a shadowy figure phishing via live chat interface targeting BPO helpdesk agents
Threat Intelligence

Google Exposes UNC6783: Chat-Phishing Extortion Wave Hits BPOs Where It Hurts

Everyone figured phishing was tamed by MFA. Google's new alert on UNC6783 shatters that—extortionists are now lurking in live chats, spoofing support domains to own BPO helpdesks.

4 min read 1 month, 1 week ago
Screenshot of Venom phishing email with QR code luring C-suite executives
Threat Intelligence

Venom PhaaS Powers Ruthless Credential Grabs from C-Suite Targets

Forget basic phishing. Venom's PhaaS targets CEOs with personalized SharePoint lures and MFA-busting tricks. It's not hype—it's hitting real boards now.

4 min read 1 month, 2 weeks ago
Infographic showing 0ktapus phishing flow from SMS to Okta credential theft across global firms
Ransomware & Malware

0ktapus Phishing Snags 10,000 Credentials Across 130 Companies—Your MFA Is the Weak Link

Your next SMS from 'IT support' could hand hackers your company's keys. 0ktapus just proved MFA is no silver bullet, snaring thousands in a slick Okta phishing blitz.

5 min read 1 month, 2 weeks ago
Diagram of Starkiller phishing proxy relaying real login page traffic
Data Breaches

Starkiller: The Proxy That Turns Real Logins into Criminal Goldmines

What if the phishing page you're staring at is the real deal, proxied through a criminal server? Starkiller makes it happen, stealing credentials and MFA in real time.

4 min read 1 month, 2 weeks ago

Categories

Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware Nation-State Threats Security Tools Compliance & Policy Cloud Security
Threat Digest

Threat intelligence. Zero noise.

More

  • RSS Feed
  • Sitemap
  • About
  • Editorial Process
  • Advertise

Legal

  • Privacy
  • Terms
  • Work With Us

Our Network

The AI Catchup AI & Machine Learning Threat Digest Cybersecurity Legal AI Beat Legal Tech Fintech Rundown Finance & Banking DevTools Feed Developer Tools Open Source Beat Open Source Fintech Dose Crypto & DeFi Chip Beat Semiconductors AdTech Beat Ad Technology Supply Chain Beat Logistics

© 2026 Threat Digest. All rights reserved.

🏠Home 🔍Search 🔖Saved 📂Categories
Privacy & cookies

We use a privacy-respecting analytics tool to count page views — no personal profiles, no ad tracking, no third-party cookies. Accept to help us understand which stories matter to readers.

Details