- Cyber Safety
- Posts
- DIY Leaks & Silent Drift: Logs, Plugins & Forgotten Accounts
DIY Leaks & Silent Drift: Logs, Plugins & Forgotten Accounts
In Partnership With
Ransomware attacks on Microsoft customers are up 275% year-over-year.
Modern attackers like Scattered Spider aren't just going after your data; they're weaponizing compromised identities to breach your M365 environment.
If your cyber resilience plan doesn't start with identity recovery, you're leaving the "keys to the kingdom" exposed.
Join our upcoming virtual event on September 9th, 9am PST—Securing M365 Data and Identity Systems against Modern Adversaries—to see how attackers exploit identity gaps and how you can fight back.
You'll learn how to:
-Unify data protection and identity recovery for a truly resilient M365 defense
-Proactively manage data risk and secure sensitive information with DSPM
-Quickly and cleanly recover Active Directory and Entra ID
Lateral Movement Is Happening Faster Than Ever
Recent threat intel shows attackers are moving laterally within networks in under 90 minutes—often using legitimate credentials and admin tools. By the time an alert is triggered, it’s already too late.
To counter: deploy network segmentation, monitor for abnormal account behavior, and shrink your privilege blast radius by default.
Employees Are Sharing Logs in Public Forums
Well-meaning developers are asking for help in public Slack groups and Stack Overflow—posting error logs or config files that include internal IPs, app keys, or credentials.
Enforce redaction training and scan outbound content for sensitive strings. Monitor developer accounts for accidental exposure activity.
SMS-Based App Logins Are Being Spoofed with VoIP Farms
Attackers are now using VoIP number farms to spoof SMS devices and trick authentication flows tied to phone numbers. Apps relying solely on SMS OTPs are wide open.
Shift to app-based or hardware MFA wherever possible. Treat phone numbers as identity hints, not authentication anchors.
Used by Execs at Google and OpenAI
Join 400,000+ professionals who rely on The AI Report to work smarter with AI.
Delivered daily, it breaks down tools, prompts, and real use cases—so you can implement AI without wasting time.
If they’re reading it, why aren’t you?
SaaS Termination Processes Are Failing Quietly
When employees leave, their access to SaaS platforms (Notion, Figma, Slack, HubSpot) is often missed—especially if those accounts aren’t SSO-managed.
Run post-termination audits across all platforms. Build automated workflows to flag lingering access, including through connected OAuth apps.
External Vendors Are Forwarding Internal Emails
Some external marketing, finance, or recruiting vendors are forwarding internal threads to personal Gmail accounts or third-party contractors—leaking confidential conversations in the process.
Flag auto-forwarding rules, restrict external sharing on sensitive threads, and review email DLP logs for policy violations.
Browser Plugins Are Logging Clipboard Data
Several recently flagged Chrome and Edge extensions have been caught logging clipboard activity—including passwords, 2FA codes, and copied emails.
Use browser management to disable unknown plugins, audit extensions quarterly, and alert when sensitive patterns are copied in unsafe environments.
Fact-based news without bias awaits. Make 1440 your choice today.
Overwhelmed by biased news? Cut through the clutter and get straight facts with your daily 1440 digest. From politics to sports, join millions who start their day informed.


