#ZeroTrust

Korora Solutionskororasolutions
2026-02-25

NetBird 0.66.0 released with new feature: netbird expose

We’re excited to introduce netbird expose — a simple and secure way to expose your local services through the NetBird reverse proxy.

forum.netbird.io/t/netbird-v0-

2026-02-24

MFA Service Degradation at Microsoft — 504 Gateway Timeout Errors
Incident MO1237461 impacting U.S. tenants across Microsoft 365.

Symptoms:
Intermittent or failed MFA challenges returning 504 errors, suggesting upstream authentication gateway or load balancing issues within Microsoft Entra ID.

Risk considerations:
• Conditional Access enforcement failures
• VPN and device login disruptions
• Federated SaaS access denial
• Identity-based perimeter breakdown

Operational challenge:
Relax MFA → Increased identity risk
Maintain MFA → Productivity halt

Are you monitoring Entra telemetry and authentication gateway latency metrics during this window?

Source: cybersecuritynews.com/microsof

Engage below.
Follow @technadu for actionable identity threat coverage.

#Infosec #MFA #EntraID #IAM #ZeroTrust #CloudSecurity #Microsoft365 #IdentityOps #SOC #CyberResilience

Microsoft MFA Down – 504 Gateway Timeout Errors Disrupting MFA Access for U.S. Users
2026-02-24

Vishing-Based Compromise at Optimizely Highlights Identity Risk

Attackers gained access via voice phishing, targeting SSO-linked systems and CRM records.

No confirmed privilege escalation, but exposure of business contact data reinforces how social engineering bypasses perimeter defenses.

Activity patterns resemble ShinyHunters campaigns abusing MFA prompts and OAuth 2.0 device authorization flows.

Common post-access targets include Salesforce, Microsoft 365, Google Workspace, Slack, SAP, Atlassian - wherever SSO tokens provide lateral access.

Identity is the control plane. Once tokens are compromised, downstream exposure scales quickly.

Is your organization monitoring abnormal device code authentication and token issuance events?

Source: bleepingcomputer.com/news/secu

Engage below.
Follow @technadu for actionable threat intelligence.

#Infosec #Vishing #OAuth #IAM #SSO #ZeroTrust #ThreatHunting #SOC #IdentitySecurity #CyberRisk

Ad tech firm Optimizely confirms data breach after vishing attack
2026-02-24

Don’t skip JIT access. Just-In-Time VM access reduces attack surface by closing RDP/SSH ports until needed. aka.ms/JITAccess #ZeroTrust #MicrosoftSecurity

NERDS.xyz – Real Tech News for Real Nerdsnerds.xyz@web.brid.gy
2026-02-23

Cloudflare becomes first SASE platform with post quantum encryption across entire stack

fed.brid.gy/r/https://nerds.xy

Boost your skills with today’s cybersecurity playlist: exploits, defenses, and real-world lessons. 🔒 youtube.com/playlist?list=PLXq

#CyberAwareness #NetworkSecurity #ZeroTrust #ThreatIntelligence #Malware

Boost your skills with today’s cybersecurity playlist: exploits, defenses, and real-world lessons. 🔒 youtube.com/playlist?list=PLXq

#CyberAwareness #NetworkSecurity #ZeroTrust #ThreatIntelligence #Malware

Boost your skills with today’s cybersecurity playlist: exploits, defenses, and real-world lessons. 🔒 youtube.com/playlist?list=PLXq

#CyberAwareness #NetworkSecurity #ZeroTrust #ThreatIntelligence #Malware

2026-02-22

Proton vs. Infinito.Nexus

Sicherheit, Skalierbarkeit und digitale Souveränität im Vergleich Digitale Souveränität bedeutet heute mehr als verschlüsselte E-Mails oder ein sicheres VPN. Es geht um Kontrolle, Anpassbarkeit, Skalierbarkeit – und um eine Sicherheitsarchitektur, die mit den eigenen Anforderungen wächst. 🔐 Zwei unterschiedliche Ansätze stehen sich dabei gegenüber: Proton als spezialisierter Privacy-Dienst und Infinito.Nexus als offene, modulare Plattform für digitale Infrastruktur. […]

blog.infinito.nexus/blog/2026/

Freundliche, futuristische Illustration mit zwei Maskottchen vor einer leuchtenden digitalen Weltkugel: Links ein lächelndes, dachsähnliches Maskottchen in violett-blauer Farbwelt mit schwebenden App-Symbolen und Laptop, rechts das Infinito.Nexus-Bärenlogo in blau-weißer Optik mit Server-Racks, Cloud- und Open-Source-Symbolen; beide Seiten sind durch ein Netzwerk aus Lichtlinien miteinander verbunden und symbolisieren zwei unterschiedliche digitale Ökosysteme.
2026-02-21

“Starkiller” phishing service proxies real login pages and relays MFA in real time.
Targets include brands like Microsoft and Google.

Result:
Passwords captured.
MFA intercepted.
Session cookies stolen.
Reported by Abnormal AI.

Phishing is evolving into enterprise-grade tooling.

Source: krebsonsecurity.com/2026/02/st

Are passkeys the only sustainable defense?
Follow @technadu for independent cybersecurity reporting.

Join the discussion below.

#CyberSecurity #Phishing #MFA #AccountTakeover #ZeroTrust #Infosec #DigitalIdentity #ThreatIntel

‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA
AllAboutSecurityallaboutsecurity
2026-02-21

Oracle erweitert OCI-Netzwerksicherheit: Zero Trust Packet Routing jetzt mit Cross-VCN-Unterstützung

Die Neuerung zielt darauf ab, die wachsende Komplexität verteilter Cloud-Architekturen beherrschbarer zu machen.

all-about-security.de/oracle-e

2026-02-21

The sentencing of Oleksandr Didenko highlights the operational mechanics of North Korea’s IT worker revenue scheme.

TTPs included:
• Identity theft & resale infrastructure
• U.S.-based laptop farms
• Remote access tooling
• Money transmitter accounts
• Tax filings under stolen identities
The Federal Bureau of Investigation linked the activity to broader nation-state revenue generation.
The United Nations estimates up to $600M annually generated via embedded IT workers.
Technical mitigation questions:
- Device attestation + hardware-bound identity?
- Continuous behavioral authentication?
- Payroll anomaly detection?
- Zero-trust for remote contractors?

Drop your technical countermeasures below.

Source: therecord.media/north-korea-la

Follow Technadu for advanced cyber threat reporting.

#ThreatModeling #InsiderThreat #NorthKorea #IdentityManagement #ZeroTrust #RemoteAccessSecurity #CyberCounterintelligence #FraudDetection #Infosec #SecurityEngineering #RiskManagement #CyberIntelligence

Ukrainian national gets 5-year sentence for involvement in North Korea IT worker scheme

Your daily dose of hacking & defense. Check out today’s curated playlist for pros & learners alike. ⚡ youtube.com/playlist?list=PLXq
#Hacking #CyberDefense #ZeroTrust #CyberAwareness #Malware

2026-02-20

The Rhysida ransomware group claims it breached the Cheyenne and Arapaho Tribes, demanding 10 BTC after disrupting education and administrative systems.

Governor Reggie Wassana confirmed refusal to negotiate.

Rhysida has a history of targeting public-sector networks, including state and municipal infrastructure.

Technical considerations:
• Initial access vector? Phishing vs exposed RDP?
• Backup segmentation and immutability
• Insurance-driven IR workflows
• Data exfiltration + double extortion tactics
• Public-sector attack surface mapping
Should smaller governments move toward managed detection and response (MDR) as a baseline requirement?

Source: therecord.media/cheyenne-arapa

Share your technical insights below.

Follow @technadu for advanced ransomware intelligence.

#Ransomware #ThreatHunting #IncidentResponse #PublicSectorSecurity #CyberResilience #BlueTeam #Infosec #GovTech #DigitalForensics #CyberThreatIntel #DataProtection #SOC #ZeroTrust

Ransomware gang threatens Cheyenne and Arapaho Tribes after shutting down schools
2026-02-20

Palo Alto Networks to acquire Koi Security for $400M, targeting the emerging Agentic Endpoint attack surface.

Koi (Assaraf, Dardikman, Kruk) developed LLM-powered analysis to detect:
• Malicious extensions/plugins
• Package ecosystem abuse (NPM, Homebrew)
• AI agent exploit chaining
• Model artifact manipulation
• Credential hijacking within agent frameworks

Planned integration into Prisma AIRS™ and Cortex XDR® aims to improve AI runtime visibility and enforcement.

Question for defenders:
Are your telemetry pipelines mapping AI agent behavior - or just traditional executables?

Source: paloaltonetworks.com/company/p

Drop your technical perspective below.
Follow Technadu for advanced threat intelligence reporting.

#Infosec #ThreatModeling #AppSec #EndpointSecurity #AIsecurity #DetectionEngineering #XDR #ZeroTrust #SupplyChainSecurity #LLMsecurity #BlueTeam #RedTeam #CyberArchitecture

Palo Alto Networks Announces Intent to Acquire Koi to Secure the Agentic Endpoint
2026-02-18

AI Platform Hardening: Lockdown Mode & Risk Labeling Framework
To mitigate prompt injection–driven data exfiltration, OpenAI introduced:
• Lockdown Mode — deterministic external interaction constraints
• Cached-only browsing under restricted mode
• Tool disablement where safety guarantees aren’t provable
• Standardized “Elevated Risk” labeling across ChatGPT, Atlas, Codex

This layered approach builds upon sandboxing, monitoring, URL exfiltration controls, and enterprise-grade RBAC with audit logs.

Security significance:
Prompt injection attacks operate at the instruction layer, not the transport layer. Deterministic restriction reduces attack surface by limiting outbound interaction vectors.

Risk labeling also formalizes user awareness — similar to privileged execution prompts in operating systems.

Source: openai.com/index/introducing-l

Question for practitioners:
Should AI network access follow zero-trust principles by default?

Follow TechNadu for AI security architecture insights.

#Infosec #AISecurity #PromptInjection #ZeroTrust #AppSec #CyberDefense #RiskManagement

Introducing Lockdown Mode and Elevated Risk labels in ChatGPT
ZATAZ - "\o/"zataz@mastox.eu
2026-02-18

La CISA ordonne le retrait des appareils en fin de vie

--> datasecuritybreach.fr/la-cisa-

// Calendrier serré : inventorier, retirer, puis surveiller en continu. Objectif : couper l’accès aux périphériques Edge non maintenus (EoL), devenus une autoroute pour les intrusions.

#CISA #cybersecurite #EOL #vulnerabilites #patchmanagement #zeroTrust #ITsecurity #zataz @Damien_Bancal

2026-02-17

CISA Operating Under Shutdown Constraints - Strategic Implications

Effective February 14, 2026, CISA is functioning at 38% staffing under Antideficiency Act exceptions.

Operational posture:
• KEV catalog maintained and updated for actively exploited vulns
• Emergency recall authority for national security threats
• Slower validation and vulnerability triage cycles expected
• CIRCIA rule finalization halted
• KEV enforcement activities likely suspended
Reduced analyst bandwidth directly impacts vulnerability validation, patch availability coordination, and federal liaison processes.

While KEV updates continue, compliance oversight appears weakened. That introduces potential lag between vulnerability disclosure and sector-wide remediation.

From a defensive architecture standpoint, this highlights the fragility of centralized cyber coordination under political funding constraints.
How should national-level cyber coordination be insulated from budget volatility?

Source: securityweek.com/cisa-navigate

Follow @technadu for threat intelligence and policy-level cybersecurity reporting.

#Infosec #CISA #KEV #CIRCIA #CyberDefense #ZeroTrust #CriticalInfrastructure #ThreatIntelligence #NationalSecurity

CISA Navigates DHS Shutdown With Reduced Staff

This Punchbowl Phish Is Bypassing 90% Of Email Filters Right Now

997 words, 5 minutes read time.

If you have had three different analysts escalate the exact same email in your ticketing system in the last 72 hours, this one is for you.

This is not a Nigerian prince scam. This is not a fake Amazon order. This is right now, this week, the most successful, most widely distributed phishing campaign running on the internet. And almost nobody is talking about just how good it is.

What this scam actually is

You get an email. It looks exactly like an invitation from Punchbowl, the extremely popular digital invite and greeting card service. There’s no misspelled logo. There’s no broken grammar. There is absolutely nothing that jumps out as fake.

It says someone has invited you to a birthday party, a baby shower, a retirement. At the very bottom, there is one single line that almost everyone misses:

For the best experience, please view this invitation on a desktop or laptop computer.

If you click the link, you do not get an invitation. You get malware. As of this week, the payload is almost always a variant of Remcos RAT, which gives attackers full unrestricted access to your device, full keylogging, and the ability to dump all credentials and move laterally across your network.

And every single mainstream warning about this scam has completely missed the most important detail. That line about the desktop? That is not a throwaway line. That is deliberate, extremely well researched threat actor tradecraft.

Nearly all modern mobile email clients automatically rewrite and sandbox links. Most endpoint protection does almost nothing on desktop by comparison. The attackers know this. They are actively telling you to defeat your own security for them. And it works.

Why this is an absolute nightmare for security teams

Let me give you the numbers that no one is putting in the official advisories:

  • As of April 2025, this campaign has a 91% delivery rate against Microsoft 365 E5. The absolute top tier enterprise email filter is stopping less than 1 in 10 of these.
  • Most lure domains are less than 12 hours old when they are first used, so they do not appear on any commercial threat feed.
  • This is not just targeting consumers. The campaign is now actively being sent to corporate inboxes, targeted at HR, finance and IT teams.
  • Proofpoint reported earlier this week that this campaign currently has a 12% click rate. For context, the average phish has a click rate of 0.8%.

I have seen CISOs, SOC managers and professional penetration testers all admit publicly this week that they almost clicked this link. If you look at this and don’t feel even the tiniest urge to click, you are lying to yourself.

This is what good phishing looks like. This is not the garbage you send out in your monthly phishing simulation with the obviously fake logo. This is the stuff that actually works.

How to not get burned

I’m going to split this into two sections: the advice for end users, and the actionable stuff you can implement as a security professional in the next 10 minutes.

For everyone

  • Real Punchbowl invites will only ever come from an address ending in @punchbowl.com. There are no exceptions. If it comes from anywhere else, delete it immediately.
  • Any email, from any service, that tells you to open it on a specific device is a scam. Full stop. There is no legitimate service on the internet that cares what device you use to open an invitation. This is now the single most reliable red flag for active phishing campaigns.
  • Do not go to Punchbowl’s website to “check if the invite is real”. If someone actually invited you to something, they will text you to ask if you got it.

For SOC Analysts and Security Teams

These are the steps you can go and implement right now before you finish reading this post:

  1. Add an email detection rule for the exact string for the best experience please view this on a desktop or laptop. At time of writing this rule has a 0% false positive rate.
  2. Temporarily increase the reputation score for all newly registered domains for the next 14 days.
  3. Add this exact lure to your phishing simulation program immediately. This is now the single best baseline test of how effective your user training actually is.
  4. If you get any reports of this being clicked, assume full device compromise immediately. Do not waste time triaging. Isolate the host.

Closing Thought

The worst part about this scam is how predictable it is. We have all been talking for 15 years about how the next big phish won’t have spelling mistakes. We all said it will look perfect. It will be something you actually expect. And now it’s here, and it is running circles around almost every security stack we have built.

If you see this email, report it. If you are on shift right now, go push that detection rule. And for the love of god, stop laughing at people who almost clicked it.

Call to Action

If this breakdown helped you think a little clearer about the threats out there, don’t just click away. Subscribe for more no-nonsense security insights, drop a comment with your thoughts or questions, or reach out if there’s a topic you want me to tackle next. Stay sharp out there.

D. Bryan King

Sources

Disclaimer:

The views and opinions expressed in this post are solely those of the author. The information provided is based on personal research, experience, and understanding of the subject matter at the time of writing. Readers should consult relevant experts or authorities for specific guidance related to their unique situations.

#attackVector #boardroomRisk #breachPrevention #CISAAlert #CISO #credentialTheft #cyberResilience #cyberattack #cybercrime #cybersecurityAwareness #defenseInDepth #desktopOnlyPhishing #detectionRule #DKIM #DMARC #emailFilterBypass #emailGateway #emailHygiene #emailSecurity #emailSecurityGateway #endpointProtection #incidentResponse #indicatorsOfCompromise #initialAccess #IoCs #lateralMovement #linkSafety #logAnalysis #maliciousLink #malware #MITREATTCK #mobileEmailRisk #phishingCampaign #phishingDetection #phishingScam #phishingSimulation #phishingStatistics #PunchbowlPhishing #ransomwarePrecursor #RemcosRAT #sandboxEvasion #securityAlert #SecurityAwarenessTraining #securityBestPractices #securityLeadership #securityMonitoring #securityOperationsCenter #securityStack #SOCAnalyst #socialEngineering #spearPhishing #SPF #suspiciousEmail #T1566001 #threatActor #threatHunting #threatIntelligence #userTraining #zeroTrust
A close-up photograph of a computer screen showing a fake Punchbowl party invitation email. The cursor hovers over a malicious link, and the suspicious "view on desktop" instruction is highlighted in red.
2026-02-17

We treat source code and containers as untrusted until explicitly verified.

In a Zero Trust world, confidence isn't assumed, it's proven 🛡️

Read how Chadd Owen maps the 7 Pillars of Zero Trust to actionable security: anchore.com/blog/anchore-enter

#ZeroTrust

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst