Skip to content
Internal Security Policy Toolkit
Audience Categories
Media Organizations
Civil Society
Vulnerable Groups
Businesses
Cyber Security Enthusiasts
Incidence Report
Resources
Blog
Community
Menu
Internal Security Policy Toolkit
Audience Categories
Media Organizations
Civil Society
Vulnerable Groups
Businesses
Cyber Security Enthusiasts
Incidence Report
Resources
Blog
Community
Media Organizations
Civil Society
Vulnerable Groups
Businesses
Cyber Security Enthusiasts
Threat Intelligence
Category
Microsoft’s Response to Security Threat
October 16, 2023
Microsoft and The Storm
In response to this threat, Microsoft swiftly took action by blocking the use of forged tokens, replacing the compromised key, and engaging in collaborative efforts with the affected organizations to resolve the issue. Read here for more details about the campaign
Account Takeover
Chinese Hacking Group
Cyber Espionage Tactics
LOAD MORE
Scroll to Top