Cybersecurity Brief

Entra Sign-In Hardening, Identity M&A, and SaaS Exposure

Coverage: 27 Nov 2025 (UTC)

Microsoft moved to harden browser-based sign-ins: beginning in 2026, Entra ID logins will block unauthorized or injected scripts under a stricter Content Security Policy. Researchers also warned that cross‑tenant collaboration can strip protections from guests, underscoring how convenience defaults create security blind spots. The day rounded out with supply‑chain exposure at OpenAI through an analytics partner, an expanded Salesforce‑linked incident at Gainsight, a major ransomware disclosure from Asahi, and fresh espionage tradecraft focused on email stores and cloud tokens.

Sign‑in hardening meets cross‑tenant gaps

Microsoft plans to restrict script downloads to trusted CDNs and allow inline execution only from approved sources on login.microsoftonline.com, excluding Entra External ID. The CSP change is slated to roll out globally in mid‑to‑late October 2026 and is positioned as part of the company’s Secure Future Initiative. Microsoft urges administrators to test sign‑in flows, avoid extensions that inject code into the sign‑in experience, and use the browser console to detect CSP violations. The guidance ties back to broader SFI measures such as phishing‑resistant MFA, memory safety work, and hardened token validation—steps meant to reduce attack surface before the policy takes effect. Why it matters: enforcing CSP at the identity entry point curbs script‑based tampering where session cookies and tokens are most valuable.

Researchers at Ontinue highlighted that a recently enabled default letting users chat with "anyone" can expose a cross‑tenant blind spot in Teams, where guest sessions inherit the host tenant’s security posture rather than the user’s home protections. According to CSO Online, this means URL scanning, Safe Links, file sandboxing and zero‑hour auto purge in Defender for Office 365 may not apply when users interact as guests. Recommended mitigations include allow‑listing partner domains for B2B invitations, applying Entra ID cross‑tenant access policies, and disabling the default "chat with Anyone" capability if risk outweighs collaboration benefits.

Identity and authorization consolidate

ServiceNow is reportedly in advanced talks to acquire identity‑security startup Veza for over $1 billion, a move that would pair enterprise automation and AI assistants with deeper authorization intelligence. As reported by CSO Online, Veza maps effective permissions across cloud, SaaS and internal systems, including non‑human identities such as API keys and service accounts. The companies already share customers and investment ties; native integration could let agents query and enforce access policies more safely, though licensing and packaging changes may follow. The market signal: authorization context is becoming a first‑class control for safe automation.

SaaS supply chain: telemetry and integrations

OpenAI notified API users that an incident at analytics provider Mixpanel led to the export of a dataset containing limited account‑identifiable and analytics metadata, including names, email addresses, coarse location, OS/browser details, referrers, and organization or user IDs. OpenAI emphasized its own systems were not breached and no API keys, prompts, responses, usage logs, passwords, payment details or government IDs were included. The company removed Mixpanel from production, is supporting the vendor’s investigation, and is warning of targeted phishing risks. Details are outlined by Infosecurity, which notes elevated vendor requirements and ongoing user notifications.

Gainsight expanded the list of customers potentially affected by unauthorized activity against its Salesforce‑integrated applications after Salesforce revoked related access and refresh tokens and shared indicators of compromise. Per The Hacker News, multiple ecosystem providers paused integrations as a precaution; the ShinyHunters group claimed involvement. Gainsight advised customers to rotate keys and connector credentials, log into NXT directly while restorations proceed, reset passwords for non‑SSO users, and reauthorize integrations as needed. The episode illustrates how third‑party connectors and OAuth flows can serve as pivot points across SaaS estates.

Incidents and espionage pressure

Asahi Group confirmed that a September ransomware attack may have exposed personal data for about 1.914 million individuals, including 1.525 million customers. Fields potentially affected include names, gender, birth dates, postal addresses, email addresses and phone numbers; the company said payment card data was not exposed. The incident disrupted orders, shipments and call centers in Japan, and the Qilin group claimed responsibility with a 27 GB leak consistent with double‑extortion tactics. As reported by Infosecurity, Asahi spent two months on containment, integrity checks and restoration, and is reviewing potential fiscal impacts. Why it matters: the narrative points to the need for Zero Trust and strict OT/IT segmentation to contain lateral movement and service disruption.

The FCC warned broadcasters that attackers have hijacked radio‑transmission paths by reconfiguring unsecured Barix devices to air bogus Emergency Alert System tones and offensive content. The notice urges patching, replacing default credentials, isolating devices behind firewalls, limiting access via VPN, and monitoring logs for unauthorized changes. Infosecurity reports that affected stations in Texas and Virginia learned of compromises from listener reports, and the commission is asking victims to alert its Operations Center and the FBI’s IC3. The takeaway: operational broadcast gear remains an attractive target when misconfigured.

Kaspersky researchers documented that the APT group ToddyCat has shifted from browser credential theft to exfiltrating Outlook OST archives and Microsoft 365 access tokens. The toolkit uses a C++ utility to copy locked OST files for offline parsing and employs token theft via OAuth artifacts or process dumps when needed; earlier activity included PowerShell toolkits executed from domain controllers to collect cookies, saved credentials, and DPAPI material. According to CSO Online, the group also abused a vulnerability in an antivirus engine for execution under trusted processes, aligning with long‑term espionage priorities. Defenders are advised to monitor for memory‑dumping tools, unusual mailbox access, and suspicious scheduled tasks.

CISA cautioned that both cybercriminals and state‑backed actors increasingly use spyware to compromise smartphones of users on encrypted messengers, targeting endpoints rather than in‑transit encryption. Tactics include fake QR codes to link accounts to attacker devices, bogus updates, and zero‑click exploits. The advisory, summarized by Bitdefender, urges prompt OS and app patching, avoiding unofficial app sources, and treating unexpected files or links with caution—even when they appear to come from known contacts.

These and other news items from the day:

Thu, November 27, 2025

Microsoft to Block Unauthorized Scripts in Entra ID

🔒 Microsoft will update its Content Security Policy to block unauthorized script injection during browser-based Entra ID sign-ins at login.microsoftonline.com. The policy will permit script downloads only from Microsoft-trusted CDN domains and allow inline execution solely from trusted Microsoft sources. Rolled out globally in mid-to-late October 2026 under the Secure Future Initiative, the change excludes Microsoft Entra External ID. Organizations should test sign-in flows and avoid browser extensions or tools that inject code to prevent authentication friction.

read more →

Thu, November 27, 2025

ServiceNow in Talks to Acquire Identity Firm Veza

🔐 ServiceNow is reportedly in advanced talks to acquire identity-security startup Veza for more than $1 billion, a deal that could be announced next week. The move would pair ServiceNow's recent AI automation capabilities from Moveworks with Veza's Authorization Graph to map and govern permissions for human and machine identities. For customers, the acquisition aims to close trust and governance gaps around AI agents and non-human accounts, though integration, licensing, and standalone availability questions remain.

read more →

Thu, November 27, 2025

Asahi breach: personal data of nearly two million exposed

🔒 Asahi Group Holdings has confirmed that personal data for approximately 1.914 million people, including 1.525 million customers, may have been exposed after a September ransomware incident that forced temporary suspension of operations. The company spent two months on containment, integrity checks and system restoration, and says credit card details were not affected. Qilin has claimed responsibility; Asahi warns customers to monitor for unsolicited communications and anticipates ongoing operational impacts.

read more →

Thu, November 27, 2025

Gainsight Expands Customer Impact After Salesforce Alert

🔒 Gainsight disclosed that suspicious activity affecting its Salesforce-connected applications has expanded beyond an initial three-customer list provided by Salesforce, with the company saying it presently knows of "only a handful" of customers whose data were affected. Salesforce revoked access and refreshed tokens for impacted Gainsight-published apps after detecting "unusual activity" claimed by the ShinyHunters group. Several vendors suspended integrations while investigations continue; Gainsight advised rotating credentials, resetting non‑SSO passwords, and reauthorizing connectors as preventive measures.

read more →

Thu, November 27, 2025

Malicious LLMs Equip Novice Hackers with Advanced Tools

⚠️ Researchers at Palo Alto Networks Unit42 found that uncensored models like WormGPT 4 and community-driven KawaiiGPT can generate functional tools for ransomware, lateral movement, and phishing. WormGPT 4 produced a PowerShell locker and a convincing ransom note, while KawaiiGPT generated scripts for credential harvesting and remote command execution. Both are accessible via subscriptions or local installs, lowering the bar for novice attackers.

read more →

Thu, November 27, 2025

ToddyCat toolkit pivots to Outlook and Microsoft tokens

🔒 Kaspersky researchers report that ToddyCat updated its toolkit in late 2024 and early 2025 to target Outlook email data and Microsoft 365 access via OAuth 2.0 tokens. Previously known for compromising internet-facing Microsoft Exchange servers, the group now uses a C++ utility, TCSectorCopy, to copy OST files and parses them with XstReader to read full email archives. When browser-based token extraction was blocked, attackers deployed ProcDump to dump tokens from Outlook memory. Kaspersky released IOCs and technical details to support detection and response.

read more →

Thu, November 27, 2025

OpenAI Alerts API Users to Mixpanel Data Exposure Incident

⚠️ OpenAI has warned that some data from users of its platform.openai.com API may have been exposed after an attacker gained unauthorized access to part of analytics vendor Mixpanel and exported a dataset. The incident began on November 9 and Mixpanel shared the dataset with OpenAI on November 25. Potentially affected fields include account names, email addresses, coarse location, browser/OS, referrers and organization or user IDs. OpenAI says its systems, chats, API keys, credentials, payment details and chat content were not compromised, and it has removed Mixpanel from production while notifying affected users and expanding vendor security reviews.

read more →

Thu, November 27, 2025

CISA Warns: State-Backed Spyware Targeting Signal, WhatsApp

🛡️ CISA has warned that cybercriminals and state-backed actors are using spyware to target users of encrypted messaging apps including Signal, WhatsApp, and Telegram. Rather than breaking end-to-end encryption, attackers compromise devices to access messages, files, contacts, call history, and location data. Techniques include fake QR codes that link accounts to attacker-controlled devices, malicious updates, and zero-click exploits that trigger on receipt of a malformed image or file. Users are urged to keep devices and apps updated, avoid installing software from untrusted sources, and treat unexpected messages or files with suspicion.

read more →

Thu, November 27, 2025

FCC Warns: Hackers Hijack Radio Gear to Air False Alerts

🔔 The FCC has warned that attackers have been hijacking US radio transmission equipment to broadcast false Emergency Alert System tones and obscene material, exploiting unsecured Barix network audio devices. Intruders reconfigured devices to pull attacker-controlled streams, causing stations in Texas and Virginia to air unauthorized Attention Signals layered with offensive language. The FCC urged broadcasters to apply vendor patches, change default credentials, isolate EAS and Barix devices behind firewalls or VPNs, monitor logs, and report incidents to manufacturers, the FCC Operations Center and IC3.

read more →

Thu, November 27, 2025

Bloody Wolf APT Expands NetSupport Campaign in Central Asia

🔎 Researchers at Group-IB and UKUK have identified a widening campaign by the Bloody Wolf APT that uses streamlined Java-based loaders to deliver NetSupport remote administration software to government targets. The operation, active since late 2023 and observed in Kyrgyzstan from at least June 2025 before spreading to Uzbekistan in early October, relies on convincing PDF lures, spoofed domains and geofenced infrastructure. Simple Java 8 loaders fetch NetSupport over HTTP, add persistence via autorun entries and scheduled tasks, display fake error messages, and include a launch-limit counter to limit execution and avoid detection. The group has shifted from using STRRAT to deploying an older 2013 build of NetSupport Manager and uses a custom JAR generator to mass-produce variants.

read more →

Thu, November 27, 2025

Microsoft Teams guest chat exposes cross-tenant blind spot

🔒 Security researchers warn that a cross-tenant collaboration design in Microsoft Teams can cause a user's Defender for Office 365 protections to be dropped when they accept a guest invitation and join another tenant. The default-enabled feature MC1182004 (chat with any email) lowers the bar for attackers to spin up hostile tenants and deliver links or files that bypass URL scanning, Safe Links, file sandboxing and zero-hour auto purge. Administrators are advised to treat guest access as a trust boundary: restrict B2B invites to vetted domains, enforce Entra ID cross-tenant policies, and disable the 'chat with Anyone' capability where appropriate.

read more →

Thu, November 27, 2025

Scattered Lapsus$ Hunters Target Zendesk Support Users

🚨 ReliaQuest has uncovered a campaign attributed to the Scattered Lapsus$ Hunters that leverages more than 40 typosquatted domains impersonating Zendesk portals, including deceptive SSO pages designed to harvest credentials. The actors have also been observed submitting fraudulent helpdesk tickets to target support staff, aiming to deploy remote access trojans and other malware. Organizations are advised to enforce MFA with hardware keys, implement IP allowlisting and session timeouts, monitor domains and DNS, and harden chat controls and content filtering to mitigate the risk.

read more →

Thu, November 27, 2025

SonicWall Ransomware Incidents Highlight M&A Risk for CSOs

🛡️ A Reliaquest analysis of June–October incidents links multiple Akira ransomware intrusions to compromised SonicWall SSL VPNs that were inherited through acquisitions. In nearly every case, acquiring organizations did not know the devices remained on their networks and attackers leveraged legacy administrative credentials. The report warns that routine financial due diligence misses such cyber risks, and urges early security-led inventory, segmentation, and credential rotation during M&A onboarding.

read more →

Thu, November 27, 2025

Hidden URL-fragment prompts can hijack AI browsers

⚠️ Researchers demonstrated a client-side prompt injection called HashJack that hides malicious instructions in URL fragments after the '#' symbol. AI-powered browsers and assistants — including Comet, Copilot for Edge, and Gemini for Chrome — read these fragments for context, allowing attackers to weaponize legitimate sites for phishing, data exfiltration, credential theft, or malware distribution. Because fragment data never reaches servers, network defenses and server logs may not detect this technique.

read more →

Thu, November 27, 2025

OpenAI Data Exposed After Mixpanel Phishing Incident

🔒 OpenAI confirmed a customer data exposure after its analytics partner Mixpanel suffered a smishing attack on November 8, which allowed attackers to access profile metadata tied to platform.openai.com accounts. Stolen fields included names, email addresses, approximate location, OS/browser details, referrers, and organization or user IDs. OpenAI says ChatGPT and core systems were not breached and that no API keys, passwords, payment data, or model payloads were exposed. The company has terminated its use of Mixpanel and is notifying impacted customers directly.

read more →

Thu, November 27, 2025

Bloody Wolf Expands Java-Based NetSupport Campaign Regionally

🐺 Group-IB and Ukuk report that the actor known as Bloody Wolf has conducted spear-phishing campaigns since June 2025 targeting Kyrgyzstan and, by October 2025, expanded into Uzbekistan to deliver NetSupport RAT. Attackers impersonate government ministries using malicious PDFs that host Java Archive (JAR) loaders built for Java 8, instructing victims to install Java so the loader can execute. The loader fetches the NetSupport payload and establishes persistence via scheduled tasks, registry entries, and a startup batch script in %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup.

read more →

Thu, November 27, 2025

Researchers Expose Widespread Dashcam Botnet Risk to Privacy

🔒 Singaporean researchers demonstrated how inexpensive offline dashcams can be weaponized into a self‑propagating surveillance network. They identified common weaknesses — default or hardcoded Wi‑Fi credentials, exposed services (FTP/RTSP), MAC‑spoofing and replay attacks — that allow attackers to download video, audio, timestamps and GPS metadata. The team showed mass compromise is feasible and offered mitigation steps for vendors and drivers.

read more →

Thu, November 27, 2025

ThreatsDay: AI Malware, Voice Scam Flaws, and IoT Botnets

🔍 This week's briefing highlights resurgent Mirai variants, AI-enabled malware, and large-scale social engineering and laundering operations. Security vendors reported ShadowV2 and RondoDox infecting IoT devices, while researchers uncovered the QuietEnvelope mail-server backdoors and a Retell AI API flaw enabling automated deepfake calls. Regulators and vendors are pushing fixes, bans, and protocol upgrades as defenders race to close gaps.

read more →

Thu, November 27, 2025

Key Provisions of the UK Cyber Security and Resilience Bill

🛡️ The Cyber Security and Resilience Bill — introduced to the House of Commons on 12 November and outlined by Shona Lester (DSIT) on 24 November — aims to strengthen protection for essential services by expanding regulatory scope and accelerating incident reporting. It brings data centres, large load controllers, managed service providers and designated critical suppliers into an Operators of Essential Services regime and requires 24‑hour notification of incidents with fuller reporting to follow. The bill also increases regulators’ enforcement powers and penalty regimes.

read more →

Thu, November 27, 2025

Smashing Security #445: Broadcast Hacks and Insider Risk

🧟 In episode 445 of the Smashing Security podcast, Graham Cluley and guest Dan Raywood review a decade of insecure broadcast infrastructure that has allowed attackers to hijack TV and radio, issue fake emergency alerts, and even replace sermons with explicit content. They also examine an alleged insider leak at a cybersecurity firm that raises urgent questions about trusted access and internal controls. The discussion highlights persistent vulnerabilities in broadcast hardware and the broader implications for public safety and incident response.

read more →

Thu, November 27, 2025

OpenAI API customer data exposed in Mixpanel breach

🔒 OpenAI has notified some ChatGPT API customers that limited identifying information was exposed following a breach at its third‑party analytics vendor, Mixpanel. Mixpanel says the incident resulted from a smishing campaign detected on November 8, and OpenAI received details of the affected dataset on November 25. Exposed fields may include names, emails, coarse location, device and browser metadata, referring websites, and account IDs, but OpenAI says no chats, API requests, usage data, passwords, API keys, payment details, or government IDs were exposed. OpenAI has removed Mixpanel from production, begun notifying affected parties, and is warning users to watch for phishing attempts and enable 2FA.

read more →

Thu, November 27, 2025

LLMs Can Produce Malware Code but Reliability Lags

🔬 Netskope Threat Labs tested whether large language models can generate operational malware by asking GPT-3.5-Turbo, GPT-4 and GPT-5 to produce Python for process injection, AV/EDR termination and virtualization detection. GPT-3.5-Turbo produced malicious code quickly, while GPT-4 initially refused but could be coaxed with role-based prompts. Generated scripts ran reliably on physical hosts, had moderate success in VMware, and performed poorly in AWS Workspaces VDI; GPT-5 raised success rates substantially but also returned safer alternatives because of stronger safeguards. Researchers conclude LLMs can create useful attack code but still struggle with reliable evasion and cloud adaptation, so full automation of malware remains infeasible today.

read more →

Thu, November 27, 2025

OpenAI Vendor Mixpanel Breach Exposes API User Data

🔒 According to an OpenAI statement, cybercriminals accessed analytics provider Mixpanel's systems in early November, and data tied to some API users may have been exposed. Potentially affected fields include account names, associated email addresses, approximate browser-derived location (city, state, country), operating system and browser details, referring websites, and organization or user IDs. OpenAI said its own systems and products such as ChatGPT were not impacted, that sensitive items like chat histories, API requests, API usage data, passwords, credentials, API keys, payment details, and government IDs were not compromised, and that it has removed Mixpanel from its systems while working with the vendor to investigate.

read more →

Thu, November 27, 2025

Retailers Brace for Holiday Fraud, Not Major Breach Spike

🔒 Huntsman Security's analysis of ICO reports from Q3 2024 to Q2 2025 indicates the retail and manufacturing sector experienced only minor seasonal peaks, with 1,381 incidents overall and quarterly counts clustered in the mid-300s. The firm reported 618 breaches caused by brute force, misconfigurations, malware, phishing and ransomware, and urged a shift to continuous assurance so defenses do not drift into vulnerable states. Other vendors cautioned that more than half of recent ransomware incidents occurred on weekends or holidays, while researchers warned of AI-enabled fake e-commerce sites, typosquatted domains and package-tracking scams targeting shoppers.

read more →

Thu, November 27, 2025

Choosing the Best Cloud Security Posture Management Tools

🔒 Cloud security posture management (CSPM) combines threat intelligence, continuous detection, and automated remediation to find and fix cloud misconfigurations that can expose data. Customers—not cloud providers—are responsible for configuring and protecting workloads, so organizations must select CSPM that delivers multicloud visibility, integrated data security, and policy-driven automated remediation. Modern offerings increasingly fold CSPM into broader CNAPP and SSE suites from vendors such as Wiz, Palo Alto Networks, Tenable, and CrowdStrike, making coverage, integration, and operational model critical factors in vendor selection.

read more →

Thu, November 27, 2025

GreyNoise launches free IP scanner to detect botnet

🔍 GreyNoise Labs has launched GreyNoise IP Check, a free scanner that lets users determine whether an IP address has been observed performing malicious scanning activity, including botnets and residential proxy traffic. The web tool returns one of three statuses — Clean, Malicious/Suspicious, or Common Business Service — and, when applicable, provides a 90-day activity timeline to help pinpoint potential infection points. A rate-limit-free JSON API is available for integration, and GreyNoise recommends conducting malware scans, updating device firmware, securing router credentials, and disabling unneeded remote access when an IP appears suspicious.

read more →

Thu, November 27, 2025

How Parents Can Protect Children from Doxxing Online

🛡️ Doxxing is the deliberate public exposure of someone's personal information online, and for children it can cause serious emotional harm and physical safety risks. Parents should reduce the personal data their kids share, review privacy settings and disable geolocation. Protect accounts with unique passwords stored in a password manager and enable multifactor authentication. If doxxing occurs, document evidence, report to platforms and authorities, and provide calm, nonjudgmental support to your child.

read more →