Skip to content
Threat Digest
Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware
Nation-State Threats Security Tools Compliance & Policy Cloud Security Threat Intelligence

#microsoft-365

Cloud Breach: Storm-2949's Identity Hack Spans Entire Azure Estate
Cloud Security

Cloud Breach: Storm-2949's Identity Hack Spans Entire Azure Estate

Forget malware. A sophisticated actor named Storm-2949 just proved that compromising a single cloud identity can unlock the entire kingdom. Microsoft's latest report lays bare a meticulously orchestrated breach that went from a stolen password to a full-blown cloud infrastructure takedown.

5 min read 4 days, 13 hours ago
Diagram illustrating a device-code phishing attack flow, showing user interaction with a lure email and fake login page leading to account compromise.
Threat Intelligence

Tycoon2FA Hijacks Microsoft Accounts via Device-Code Phishing

Cybercriminals are exploiting a legitimate Microsoft feature to gain unfettered access to cloud accounts. The resurfaced Tycoon2FA phishing kit highlights a sophisticated new attack vector.

6 min read 6 days, 4 hours ago
A visual representation of data flow showing a legitimate Microsoft Dynamics redirect leading to a hidden phishing payload, emphasizing the stealthy nature of the attack.
Cloud Security

Microsoft Dynamics Redirects Fuel Phishing at Scale [2026]

Forget spoofed domains and compromised accounts. The new frontier of phishing is here, weaponizing trusted SaaS platforms like Microsoft Dynamics for massive, undetectable attacks.

6 min read 1 week, 6 days ago

Categories

Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware Nation-State Threats Security Tools Compliance & Policy Cloud Security
Threat Digest

Threat intelligence. Zero noise.

More

  • RSS Feed
  • Sitemap
  • About
  • Editorial Process
  • Advertise

Legal

  • Privacy
  • Terms
  • Work With Us

Our Network

The AI Catchup AI & Machine Learning Threat Digest Cybersecurity Legal AI Beat Legal Tech Fintech Rundown Finance & Banking DevTools Feed Developer Tools Open Source Beat Open Source Fintech Dose Crypto & DeFi Chip Beat Semiconductors AdTech Beat Ad Technology Supply Chain Beat Logistics

© 2026 Threat Digest. All rights reserved.

🏠Home 🔍Search 🔖Saved 📂Categories
Privacy & cookies

We use a privacy-respecting analytics tool to count page views — no personal profiles, no ad tracking, no third-party cookies. Accept to help us understand which stories matter to readers.

Details