Hacker News
- Compromised Microsoft key: More impactful than we thought https://www.wiz.io/blog/storm-0558-compromised-microsoft-key-enables-authentication-of-countless-micr 87 comments
- Compromised Microsoft Key by Chinese Threat Actor: More Impactful Than Reported https://www.wiz.io/blog/storm-0558-compromised-microsoft-key-enables-authentication-of-countless-micr 2 comments
- Microsoft hasn't updated us on Storm-0558 in 2 weeks https://www.wiz.io/blog/storm-0558-compromised-microsoft-key-enables-authentication-of-countless-micr 54 comments sysadmin
Linking pages
- Why you should move back to datacenters https://rakkhi.substack.com/p/why-you-should-move-back-to-datacenters 89 comments
- You Can't Control Your Data in the Cloud https://karl-voit.at/cloud/ 60 comments
- Vendors criticize Microsoft for repeated security failings | TechTarget https://www.techtarget.com/searchsecurity/news/366549116/Vendors-criticize-Microsoft-for-repeated-security-failings 1 comment
- Stolen Azure AD key offered widespread access to Microsoft cloud services https://www.bleepingcomputer.com/news/security/stolen-azure-ad-key-offered-widespread-access-to-microsoft-cloud-services/ 0 comments
- Reseaerchers suspect China Microsoft email hackers had access to other files - The Washington Post https://www.washingtonpost.com/technology/2023/07/22/china-microsoft-email-hack/ 0 comments
- Storm-0558 Update: Takeaways from Microsoft's recent report | Wiz Blog https://www.wiz.io/blog/key-takeaways-from-microsofts-latest-storm-0558-report 0 comments
- Threat Actor - MISP galaxy https://misp-galaxy.org/threat-actor/ 0 comments
Linked pages
- Microsoft mitigates China-based threat actor Storm-0558 targeting of customer email | MSRC Blog | Microsoft Security Response Center https://msrc.microsoft.com/blog/2023/07/microsoft-mitigates-china-based-threat-actor-storm-0558-targeting-of-customer-email/ 16 comments
- Mitigation for China-Based Threat Actor Activity - Microsoft On the Issues https://blogs.microsoft.com/on-the-issues/2023/07/11/mitigation-china-based-threat-actor/ 0 comments
- Analysis of Storm-0558 techniques for unauthorized email access | Microsoft Security Blog https://www.microsoft.com/en-us/security/blog/2023/07/14/analysis-of-storm-0558-techniques-for-unauthorized-email-access/ 0 comments
Related searches:
Search whole site: site:wiz.io
Search title: Compromised Microsoft Key: More Impactful Than We Thought | Wiz Blog
See how to search.