Skip to content
InfosecToday.com
  • Cybersecurity News
  • Cybersecurity Articles
  • Cybersecurity Glossary
  • Contact
  • Login
InfosecToday.com

Microsoft Entra ID

  • a blurry photo of a city street at night
    Authentication Vulnerabilities | Cybersecurity Threats | Phishing Techniques 

    Hackers using specialized phishing tools for downgrade attacks on FIDO authentication

  • a person holding a cell phone in their hand
    Authentication Vulnerabilities | Lateral Movement Techniques | Tenant Compromise Methods 

    Recent techniques for lateral movement within Active Directory have emerged that circumvent authentication measures and enable data exfiltration.

© 2026 InfosecToday.com - WordPress Theme by Kadence WP

How cybersecure is your business? Take our free quiz and find out
Cyber risk scorecard
  • Cybersecurity News
  • Cybersecurity Articles
  • Cybersecurity Glossary
  • Contact
  • Login
Search