ThreatDown Powered by Malwarebytes
Get a demo
  • Nebula support
  • OneView support
  • Nebula sign in
  • OneView sign in
  • Partner Portal sign in
ThreatDown Powered by Malwarebytes
  • Products

  • Endpoint Detection & Response (EDR)
  • Identity Threat Detection & Response (ITDR)
  • Endpoint Protection
  • Vulnerability Assessment
  • Patch Management
  • Application Block
  • DNS Filtering
  • Mobile Security
  • Email Security
  • Services

  • Managed Detection & Response (MDR)
  • Managed Threat Hunting
  • Premium Support
  • Features

  • Browser Phishing Protection
  • Firewall Management
  • Security Advisor
  • Platforms

  • Nebula
  • Manage your organization’s endpoint security in a single-tenant console

    Nebula customer sign in >

  • OneView
  • Provides MSPs centralized visibility and management capabilities across customer sites

    OneView customer sign in >

  • Explore Partnerships
  • Review program benefits, innovative technology, channel first mentality

  • Managed Service Providers
  • Everything MSPs need to run their business seamlessly

  • Technology Partners
  • Explore our technology integrations

  • Resellers
  • Build growth, profitability, and customer loyalty

  • Retain and grow your business with tools, education, and support in the partner experience center.

    Sign in to PXC >

  • Threat Center
  • Learn about the latest threat news

  • Reports
  • Threat Detections
  • Executive POV
  • Glossary
  • Blog
  • Resource Center
  • Learn more about ThreatDown

  • ThreatDown News
  • Case Studies
  • Reviews
  • Cybersecurity Tips & Tricks
  • Webinars
  • The essential guide to surviving the age of AI-driven cybercrime.

    Download now >

  • Why ThreatDown

  • About Us
  • ThreatDown vs. Competition
  • Case Studies
  • ThreatDown named Product of the Year by MRG Effitas.

    Learn more >

Pricing
Get a demo
Home > Blog

MFA

Microsoft 365 logo

Microsoft 365 users targeted in 2FA-busting phishing campaigns

Researchers have uncovered a Phishing-as-a-Service platform that enables criminals to bypass some forms of 2FA.
2 minutes
Snowflake logo

Snowflake “breach” looks like 165 individual incidents

After an investigation, Snowflake has concluded that recent data leaks were not caused by a vulnerability or breach of its…
2 minutes
person entering credentials with code 2FA concept

More cybercriminals stealing auth tokens to bypass MFA

3 minutes
email program displaying a huge number of spam messages

Exchange servers abused for spam through malicious OAuth applications

3 minutes
Microsoft will disable Basic authentication

Microsoft will disable Basic authentication for Exchange Online in less than a month

2 minutes
Zeppelin

CISA and FBI issue alert about Zeppelin ransomware

3 minutes
money hanging from a laundry line

4 ways businesses can save money on cyber insurance

5 minutes
Wide shot of smiling farmer carrying bin of freshly harvested organic curly kale through field on fall morning

FBI warns food and agriculture to brace for seasonal ransomware attacks

3 minutes
Flag of Iran on a computer binary codes falling from the top and fading away.

CISA warns of cyberespionage by Iranian APT “MuddyWater”

1 minute
Protect yourself from BlackMatter ransomware: Advice issued

Protect yourself from BlackMatter ransomware: Advice issued

3 minutes
SUPERNOVA malware discovered on SolarWinds Orion server

SUPERNOVA malware discovered on SolarWinds Orion server

4 minutes
Cybercriminals want your cloud services accounts, CISA warns

Cybercriminals want your cloud services accounts, CISA warns

2 minutes
10 best practices for MSPs to secure their clients and themselves from ransomware

10 best practices for MSPs to secure their clients and themselves from ransomware

9 minutes

Categories

Breaches
Product News
Ransomware
Threat Intelligence
Vulnerabilities
LinkedIn
X
YouTube
Facebook

Cybercrime Has Gone Machine-Scale

AI is automating malware faster than security can adapt.

Get the facts Read the 2026 State of Malware
ThreatDown Powered by Malwarebytes

Products & Services

Endpoint Detection & Response
Endpoint Protection
Managed Detection & Response
Pricing

Partners

MSP Partner Program
Reseller Partner Program
Technology Partners
Become a Partner

Managed Services Terms & Conditions

Managed Service Terms
MTH Service Description
MDR Service Description

Resources

Threat Center
Resource Center
Blog
Glossary

Support

Nebula Support
OneView Support

Company

About Us
Press
Careers

Get in Touch

Contact Us
Schedule a Meeting
Request a Demo

ThreatDown Newsletter

LinkedIn
X
YouTube
Facebook
Read ThreatDown reviews on G2
  • Legal
  • Privacy
  • Accessibility
  • Compliance Certifications
  • Vulnerability Disclosure
  • Terms of Service
  • © 2026 All Rights Reserved