{"id":54866,"date":"2023-12-12T17:00:00","date_gmt":"2023-12-12T17:00:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks\/"},"modified":"2023-12-12T17:00:00","modified_gmt":"2023-12-12T17:00:00","slug":"strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks\/","title":{"rendered":"Strengthening identity protection in the face of highly sophisticated attacks"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/techcommunity.microsoft.com\/t5\/image\/serverpage\/image-id\/533710iC02EF8C7DA77BE9F\/image-size\/original?v=v2&amp;px=-1\" class=\"ff-og-image-inserted\"><\/div>\n<p><span data-contrast=\"auto\">When it comes to security at Microsoft, we\u2019re customer zero as our <\/span><span>Chief Security Advisor<\/span><span data-contrast=\"auto\"> and CVP<\/span> <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/bret-arsenault\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Bret Arsenault<\/span><\/a><span data-contrast=\"auto\"> often emphasizes. That means we think a lot about how we build security into everything we do\u2014not only for our customers\u2014but for ourselves. We continuously work to improve the built-in security of our products and platforms. With the unparalleled <\/span><span>breadth <\/span><span data-contrast=\"auto\">of our digital landscape and the integral role we play in our customers\u2019 businesses, we feel a unique responsibility to take a leadership role in securing the future for our customers, ourselves, and our community.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">To that end, on November 2<\/span><span data-contrast=\"auto\">nd<\/span><span data-contrast=\"auto\">, 2023, we launched the <\/span><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2023\/11\/02\/announcing-microsoft-secure-future-initiative-to-advance-security-engineering\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong><span data-contrast=\"none\">Secure Future Initiative (SFI)<\/span><\/strong><\/a><span data-contrast=\"auto\">. It\u2019s a multi-year commitment to advance the way we design, build, test, and operate our technology to ensure we deliver solutions that meet the highest possible standards of security. Fundamentally, it encompasses three key engineering advances that help us meet our commitment:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font data-listid=\"38\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong><i><span data-contrast=\"auto\">Transforming software development with automation and AI<\/span><\/i><\/strong><span data-contrast=\"auto\">\u2014 Enhancing the Security Development Lifecycle (SDL) to integrate dynamic cybersecurity protections. This approach utilizes AI for secure code analysis, Github Copilot for auditing and testing against advanced threats, and new default settings for multifactor authentication to <\/span><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/06\/automatic-conditional-access-policies-in-microsoft-entra-streamline-identity-protection\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">reduce the likelihood of breach by up to 99.22%.<\/span><\/a><\/li>\n<li data-leveltext=\"%1.\" data-font data-listid=\"38\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><strong><i><span data-contrast=\"auto\">Strengthening identity protection against highly sophisticated attacks<\/span><\/i><\/strong><span data-contrast=\"auto\">\u2014 Responding to the surge in identity-based threats, we\u2019re advancing identity protection across all products and platforms through a unified verification process for users, devices, and services. These advanced capabilities will also be available to external developers through standard identity libraries.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font data-listid=\"38\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><strong><i><span data-contrast=\"auto\">Setting a new standard for faster vulnerability response and security updates<\/span><\/i><\/strong><span data-contrast=\"auto\">\u2014Our goal is to reduce the time it takes to mitigate cloud vulnerabilities by 50%. We will also take a more public stance against third-party researchers being put under non-disclosure agreements by technology providers. Without full transparency on vulnerabilities, the security community cannot learn collectively\u2014defending at scale requires a growth mindset. Microsoft is committed to transparency and will encourage every major cloud provider to adopt the same approach.&nbsp;&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<\/ol>\n<p><span><strong><span class=\"TextRun SCXW14770132 BCX8\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW14770132 BCX8\">Creating more resilient <\/span><span class=\"NormalTextRun SCXW14770132 BCX8\">token <\/span><span class=\"NormalTextRun SCXW14770132 BCX8\">signing key<\/span> <\/span><\/strong><\/span><\/p>\n<p><span data-contrast=\"auto\">To delve deeper into the second engineering advance\u2014<\/span><a href=\"https:\/\/delivery-microsoft.sitecorecontenthub.cloud\/api\/public\/content\/35038b1fc59048979eca44a519d7b4f2?v=137ddca2\" target=\"_blank\" rel=\"noopener nofollow noreferrer\"><strong><span data-contrast=\"none\">strengthening identity protection against highly sophisticated attacks<\/span><\/strong><\/a><span data-contrast=\"auto\">\u2014we&#8217;ve crafted a white paper focusing on the tangible actions we\u2019re taking towards more resilient identity systems and token signing keys.<\/span><\/p>\n<p><span data-contrast=\"auto\">As more customers understand the importance of multifactor authentication (MFA) and get ahead of the threat curve, we\u2019re seeing attackers increase the velocity of attacks on the remaining organizations that have yet to implement MFA by default. In our Secure Identities white paper, we share details on our engineering advances to strengthen identity protection, focusing on token signing key management and identity.<\/span><\/p>\n<p><span data-contrast=\"auto\">Explore the five categories shaping our token signing key management systems:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font data-listid=\"39\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong><span data-contrast=\"auto\">Enhanced automation for key management (zero touch)<\/span><\/strong><span data-contrast=\"auto\">\u2014Fully automate enterprise identity signing key management and remove the ability of human error or exploitation. In the near future, we will move consumer keys to the same system.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font data-listid=\"39\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong><span data-contrast=\"auto\">Storing and managing keys in secure hardware (HSM)<\/span><\/strong><span data-contrast=\"auto\">\u2014Aim to have all identity signing keys stored in Hardware Security Modules (HSM) to make the keys invulnerable to accidental or intentional storage access.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font data-listid=\"39\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong><span data-contrast=\"auto\">Ensuring keys are protected in memory (confidential <\/span><\/strong><span><strong>computing <\/strong><\/span><strong><span data-contrast=\"auto\">service)<\/span><\/strong><span data-contrast=\"auto\">\u2014Prevent keys from becoming exfiltrated even if the underlying processes become compromised \u2014by using Microsoft Azure\u2019s confidential <\/span><span>computing <\/span><span data-contrast=\"auto\">service to manage signing processes.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font data-listid=\"39\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong><span data-contrast=\"auto\">Increasing key rotation frequency (rapid key rotation)<\/span><\/strong><span data-contrast=\"auto\">\u2014More regularly and more rapidly retire and rotate keys in the identity infrastructure, so in the unlikely event a key is acquired<\/span><span data-contrast=\"auto\">, attackers will have little time to use it.&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font data-listid=\"39\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong><span data-contrast=\"auto\">Monitoring key usage for suspicious activity (built-in telemetry)\u2014<\/span><\/strong><span data-contrast=\"auto\">Define security invariants, the things that must hold, and then explicitly build system logging, detections, and alerting to make sure we know instantly that something is behaving outside our expectations.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<\/ol>\n<p><a href=\"https:\/\/delivery-microsoft.sitecorecontenthub.cloud\/api\/public\/content\/35038b1fc59048979eca44a519d7b4f2?v=137ddca2\" target=\"_blank\" rel=\"noopener nofollow noreferrer\"><span data-contrast=\"none\">Read the white paper<\/span><\/a><span data-contrast=\"auto\"> to learn more about each of the five categories and how they work together to protect customers against escalating identity attacks.&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span><strong>Ignite 2023: Continuously raising the identity security bar for our customers<\/strong><\/span><\/p>\n<p><span><span><span class=\"TextRun SCXW241067837 BCX8\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW241067837 BCX8\">At Ignite, <\/span><span class=\"NormalTextRun SCXW241067837 BCX8\">I had the pleasure <\/span><span class=\"NormalTextRun SCXW241067837 BCX8\">of<\/span><span class=\"NormalTextRun SCXW241067837 BCX8\"> shar<\/span><span class=\"NormalTextRun SCXW241067837 BCX8\">ing<\/span><span class=\"NormalTextRun SCXW241067837 BCX8\"> the stage with <\/span><span class=\"NormalTextRun SCXW241067837 BCX8\">Mia Reyes, <\/span><span class=\"NormalTextRun SCXW241067837 BCX8\">Director of Foundational Security at Microsoft<\/span><\/span><span class=\"TrackedChange SCXW241067837 BCX8\"><span class=\"TextRun SCXW241067837 BCX8\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW241067837 BCX8\">,<\/span><\/span><\/span><span class=\"TextRun SCXW241067837 BCX8\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW241067837 BCX8\"> to <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW241067837 BCX8\">present&nbsp;<\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW241067837 BCX8\">and<\/span><span class=\"NormalTextRun SCXW241067837 BCX8\"> receive live feedback on how <\/span><span class=\"NormalTextRun SCXW241067837 BCX8\">we\u2019re<\/span><span class=\"NormalTextRun SCXW241067837 BCX8\"> strengthening identity protection. <\/span><span class=\"NormalTextRun SCXW241067837 BCX8\">In<\/span> <span class=\"NormalTextRun SCXW241067837 BCX8\">the<\/span><span class=\"NormalTextRun SCXW241067837 BCX8\"> session titled<\/span><span class=\"NormalTextRun SCXW241067837 BCX8\"> \u201c<\/span><\/span><a class=\"Hyperlink SCXW241067837 BCX8\" href=\"https:\/\/ignite.microsoft.com\/en-US\/sessions\/fd3f2531-2b3a-4fbe-b0aa-0a46cccb0a3a?source=sessions\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW241067837 BCX8\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW241067837 BCX8\" data-ccp-charstyle=\"Hyperlink\">Boosting ID Protection Amid Sophisticated Attacks<\/span><\/span><\/a><span class=\"TextRun SCXW241067837 BCX8\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW241067837 BCX8\">,<\/span><span class=\"NormalTextRun SCXW241067837 BCX8\">\u201d<\/span> <span class=\"NormalTextRun SCXW241067837 BCX8\">Mia <\/span><span class=\"NormalTextRun SCXW241067837 BCX8\">and I<\/span> <span class=\"NormalTextRun SCXW241067837 BCX8\">shared <\/span><span class=\"NormalTextRun SCXW241067837 BCX8\">more information about the formation of&nbsp;<\/span><\/span><span class=\"TextRun SCXW241067837 BCX8\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW241067837 BCX8\">the <\/span><\/span><a class=\"Hyperlink SCXW241067837 BCX8\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2023\/11\/02\/announcing-microsoft-secure-future-initiative-to-advance-security-engineering\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW241067837 BCX8\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW241067837 BCX8\" data-ccp-charstyle=\"Hyperlink\">Secure Future Initiative (SFI)<\/span><\/span><\/a><span class=\"TextRun SCXW241067837 BCX8\" data-contrast=\"auto\"> <span class=\"NormalTextRun SCXW241067837 BCX8\">as well as<\/span> <span class=\"NormalTextRun SCXW241067837 BCX8\">alarming statistics and real-world incidents underscoring the dire need to reinforce identity protection<\/span><span class=\"NormalTextRun SCXW241067837 BCX8\">. <\/span><span class=\"NormalTextRun SCXW241067837 BCX8\">For example, we ran tests and found that <\/span><span class=\"NormalTextRun SCXW241067837 BCX8\">on <\/span><span class=\"NormalTextRun SCXW241067837 BCX8\"> first attempt<\/span><span class=\"NormalTextRun SCXW241067837 BCX8\"> of <\/span><span class=\"NormalTextRun SCXW241067837 BCX8\">a <\/span><span class=\"NormalTextRun SCXW241067837 BCX8\">malicious, <\/span><span class=\"NormalTextRun SCXW241067837 BCX8\">unprompted simple MFA approval request, <\/span><span class=\"NormalTextRun SCXW241067837 BCX8\">1%<\/span> <span class=\"NormalTextRun SCXW241067837 BCX8\">of users <\/span><span class=\"NormalTextRun SCXW241067837 BCX8\">will approve <\/span><span class=\"NormalTextRun SCXW241067837 BCX8\">it<\/span><span class=\"NormalTextRun SCXW241067837 BCX8\">\u2014that\u2019s <\/span><span class=\"NormalTextRun SCXW241067837 BCX8\">likely <\/span><span class=\"NormalTextRun SCXW241067837 BCX8\">MFA<\/span><span class=\"NormalTextRun SCXW241067837 BCX8\"> fatigue<\/span><span class=\"NormalTextRun SCXW241067837 BCX8\">. <\/span><span class=\"NormalTextRun SCXW241067837 BCX8\">One way <\/span><span class=\"NormalTextRun SCXW241067837 BCX8\">we\u2019re<\/span> <span class=\"NormalTextRun SCXW241067837 BCX8\">helping to reduce fatigue is with<\/span> <\/span><a class=\"Hyperlink SCXW241067837 BCX8\" href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/identity\/authentication\/how-to-mfa-number-match\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW241067837 BCX8\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW241067837 BCX8\" data-ccp-charstyle=\"Hyperlink\">n<\/span><span class=\"NormalTextRun SCXW241067837 BCX8\" data-ccp-charstyle=\"Hyperlink\">umber matching <\/span><span class=\"NormalTextRun SCXW241067837 BCX8\" data-ccp-charstyle=\"Hyperlink\">in Microsoft Authenticator<\/span><\/span><\/a><span class=\"TextRun SCXW241067837 BCX8\" data-contrast=\"auto\"> <span class=\"NormalTextRun SCXW241067837 BCX8\">which<\/span> <span class=\"NormalTextRun SCXW241067837 BCX8\">helps<\/span><span class=\"NormalTextRun SCXW241067837 BCX8\"> MFA approvers to pause, <\/span><span class=\"NormalTextRun SCXW241067837 BCX8\">focus on the <\/span><span class=\"NormalTextRun SCXW241067837 BCX8\">request at hand<\/span><span class=\"NormalTextRun SCXW241067837 BCX8\">, and then approve<\/span><span class=\"NormalTextRun SCXW241067837 BCX8\"> or deny<\/span> <span class=\"NormalTextRun SCXW241067837 BCX8\">the<\/span><span class=\"NormalTextRun SCXW241067837 BCX8\"> request.<\/span><\/span> <span class=\"TrackedChange SCXW241067837 BCX8\"><span class=\"TextRun SCXW241067837 BCX8\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW241067837 BCX8\">Beyond that, we recognize that we <\/span><\/span><\/span><span class=\"TrackedChange SCXW241067837 BCX8\"><span class=\"TextRun SCXW241067837 BCX8\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW241067837 BCX8\">have to<\/span><\/span><\/span><span class=\"TrackedChange SCXW241067837 BCX8\"><span class=\"TextRun SCXW241067837 BCX8\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW241067837 BCX8\"> do more to help people.<\/span><span class=\"NormalTextRun SCXW241067837 BCX8\"> Watch the video below for <\/span><\/span><\/span><span class=\"TrackedChange SCXW241067837 BCX8\"><span class=\"TextRun SCXW241067837 BCX8\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW241067837 BCX8\">a few <\/span><\/span><\/span><span class=\"TrackedChange SCXW241067837 BCX8\"><span class=\"TextRun SCXW241067837 BCX8\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW241067837 BCX8\">policy updates <\/span><span class=\"NormalTextRun SCXW241067837 BCX8\">we\u2019ve<\/span><span class=\"NormalTextRun SCXW241067837 BCX8\"> released to <\/span><\/span><\/span><span class=\"TrackedChange SCXW241067837 BCX8\"><span class=\"TextRun SCXW241067837 BCX8\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW241067837 BCX8\">increase MFA adoption.<\/span><\/span><\/span><span class=\"EOP TrackedChange SCXW241067837 BCX8\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/span><\/span><\/p>\n<p><span><span><span class=\"EOP TrackedChange SCXW241067837 BCX8\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\"><span class=\"TextRun SCXW105864796 BCX8\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW105864796 BCX8\">MFA fatigue is only one <\/span><span class=\"NormalTextRun SCXW105864796 BCX8\">of <\/span><span class=\"NormalTextRun SCXW105864796 BCX8\">the many <\/span><span class=\"NormalTextRun SCXW105864796 BCX8\">identity security<\/span> <span class=\"NormalTextRun SCXW105864796 BCX8\">issues<\/span> <span class=\"NormalTextRun SCXW105864796 BCX8\">our customers are <\/span><span class=\"NormalTextRun SCXW105864796 BCX8\">facing, which I <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW105864796 BCX8\">detail<\/span><span class=\"NormalTextRun SCXW105864796 BCX8\"> in the live session. <\/span><span class=\"NormalTextRun SCXW105864796 BCX8\">MFA attacks <\/span><span class=\"NormalTextRun SCXW105864796 BCX8\">can also <\/span><span class=\"NormalTextRun SCXW105864796 BCX8\">include SIM Jacking, where <\/span><span class=\"NormalTextRun SCXW105864796 BCX8\">a bad actor convinces a carrier to <\/span><span class=\"NormalTextRun SCXW105864796 BCX8\">transfer your phone number, often by <\/span><span class=\"NormalTextRun SCXW105864796 BCX8\">utilizing<\/span><span class=\"NormalTextRun SCXW105864796 BCX8\"> existing <\/span><span class=\"NormalTextRun SCXW105864796 BCX8\">information they find online <\/span><span class=\"NormalTextRun SCXW105864796 BCX8\">about you from social media<\/span><span class=\"NormalTextRun SCXW105864796 BCX8\"> or <\/span><span class=\"NormalTextRun SCXW105864796 BCX8\">phishing<\/span><span class=\"NormalTextRun SCXW105864796 BCX8\">\u2014or even information <\/span><span class=\"NormalTextRun SCXW105864796 BCX8\">purchased<\/span> <span class=\"NormalTextRun SCXW105864796 BCX8\">from sellers of previously leaked and stolen data.<\/span> <span class=\"NormalTextRun SCXW105864796 BCX8\">And <\/span><span class=\"NormalTextRun SCXW105864796 BCX8\">our customer<\/span><span class=\"NormalTextRun SCXW105864796 BCX8\">s<\/span><span class=\"NormalTextRun SCXW105864796 BCX8\"> have <\/span><span class=\"NormalTextRun SCXW105864796 BCX8\">also seen attackers bypass MFA controls entirely using <\/span><span class=\"NormalTextRun SCXW105864796 BCX8\">an adversary-in-the<\/span> <span class=\"NormalTextRun SCXW105864796 BCX8\">middle<\/span><span class=\"NormalTextRun SCXW105864796 BCX8\"> (<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW105864796 BCX8\">AitM<\/span><span class=\"NormalTextRun SCXW105864796 BCX8\">) <\/span><span class=\"NormalTextRun SCXW105864796 BCX8\">a<\/span><span class=\"NormalTextRun SCXW105864796 BCX8\">pproach<\/span><span class=\"NormalTextRun SCXW105864796 BCX8\"> to steal session cookies and gain access to <\/span><span class=\"NormalTextRun SCXW105864796 BCX8\">a user\u2019s email accounts.&nbsp;<\/span><\/span><span class=\"EOP TrackedChange SCXW105864796 BCX8\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/span><\/span><\/span><\/p>\n<p><span class=\"TextRun SCXW239848512 BCX8\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW239848512 BCX8\">If you missed the <\/span><span class=\"NormalTextRun SCXW239848512 BCX8\">live <\/span><span class=\"NormalTextRun SCXW239848512 BCX8\">session, <\/span><\/span><a class=\"Hyperlink SCXW239848512 BCX8\" href=\"https:\/\/www.youtube.com\/watch?v=CA6VHDDoiAc\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><span class=\"TextRun Underlined SCXW239848512 BCX8\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW239848512 BCX8\" data-ccp-charstyle=\"Hyperlink\">watch it now<\/span><\/span><\/a><span class=\"TextRun SCXW239848512 BCX8\" data-contrast=\"auto\"> <span class=\"NormalTextRun SCXW239848512 BCX8\">learn <\/span><span class=\"NormalTextRun SCXW239848512 BCX8\">about <\/span><span class=\"NormalTextRun SCXW239848512 BCX8\">these types of infrastructure compromise attacks<\/span><span class=\"NormalTextRun SCXW239848512 BCX8\">, plus password and post-authentication attacks.<\/span> <span class=\"NormalTextRun SCXW239848512 BCX8\">I also share more information on our<\/span> <span class=\"NormalTextRun SCXW239848512 BCX8\">advancements <\/span><span class=\"NormalTextRun SCXW239848512 BCX8\">in identity protections<\/span><span class=\"NormalTextRun SCXW239848512 BCX8\"> in the session<\/span><span class=\"NormalTextRun SCXW239848512 BCX8\">, <\/span><span class=\"NormalTextRun SCXW239848512 BCX8\">including<\/span> <\/span><a class=\"Hyperlink SCXW239848512 BCX8\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/11\/06\/automatic-conditional-access-policies-in-microsoft-entra-streamline-identity-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"FieldRange SCXW239848512 BCX8\"><span class=\"TrackedChange SCXW239848512 BCX8\"><span class=\"TextRun Underlined SCXW239848512 BCX8\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW239848512 BCX8\" data-ccp-charstyle=\"Hyperlink\">the automatic roll-out of Microsoft-managed Conditional Access policies<\/span><\/span><\/span><\/span><\/a><span class=\"TextRun SCXW239848512 BCX8\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW239848512 BCX8\">,<\/span> <span class=\"NormalTextRun SCXW239848512 BCX8\">automated key management<\/span><span class=\"NormalTextRun SCXW239848512 BCX8\">,<\/span><span class=\"NormalTextRun SCXW239848512 BCX8\"> and Hardware Security Modules (HSM) for fortified key storage<\/span><span class=\"NormalTextRun SCXW239848512 BCX8\">\u2014<\/span><span class=\"NormalTextRun SCXW239848512 BCX8\">crucial <\/span><span class=\"NormalTextRun SCXW239848512 BCX8\">innovations<\/span> <span class=\"NormalTextRun SCXW239848512 BCX8\">to<\/span><span class=\"NormalTextRun SCXW239848512 BCX8\"> mitigat<\/span><span class=\"NormalTextRun SCXW239848512 BCX8\">e<\/span><span class=\"NormalTextRun SCXW239848512 BCX8\"> human errors and bolster defenses against sophisticated aggressors.<\/span><\/span><span class=\"EOP SCXW239848512 BCX8\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span><strong><span data-contrast=\"auto\">Series: Unpacking the Secure Future Initiative<\/span><\/strong><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/span><\/p>\n<p><span data-contrast=\"auto\">As we think about the current cyber threats our customers face, as well as the unique responsibility we have to continually and continuously improve the built-in security of our products and platforms, we want to continue this conversation over the coming months. To that end, this post will be the first in a series where we\u2019ll return to unpack and share more detail about the following concepts and commitments:&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"40\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Secure by default<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"40\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Common libraries &amp; help for developers<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"40\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Innovations in how identity systems work (TB, SSE, CAE)<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"40\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Innovations in detection and monitoring<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"40\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Innovations in key management automation<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"40\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Innovations in secure key storage<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"40\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Innovations in secure key usage<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Visit our <\/span><a href=\"https:\/\/www.microsoft.com\/microsoft-cloud\/resources\/built-in-security\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">built-in security<\/span><\/a><span data-contrast=\"auto\"> website to learn more about our security approach. And stay tuned for more posts in the future as we work together to build a secure future for our customers, ourselves, and our community.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><em><span class=\"TextRun Highlight SCXW72525651 BCX8\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW72525651 BCX8\">To learn more about Microsoft S<\/span><\/span><span class=\"TextRun SCXW72525651 BCX8\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW72525651 BCX8\">ecurity solutions,<\/span><\/span><span class=\"TextRun Highlight SCXW72525651 BCX8\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW72525651 BCX8\"> visit our\u202f<\/span><\/span><a class=\"Hyperlink SCXW72525651 BCX8\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Highlight SCXW72525651 BCX8\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW72525651 BCX8\">website.<\/span><\/span><\/a><span class=\"TextRun Highlight SCXW72525651 BCX8\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW72525651 BCX8\">\u202fBookmark the\u202f<\/span><\/span><a class=\"Hyperlink SCXW72525651 BCX8\" href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Highlight Underlined SCXW72525651 BCX8\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW72525651 BCX8\" data-ccp-charstyle=\"Hyperlink\">Security blog<\/span><\/span><\/a><span class=\"TextRun Highlight SCXW72525651 BCX8\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW72525651 BCX8\">\u202fto keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<\/span><\/span><a class=\"Hyperlink SCXW72525651 BCX8\" href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><span class=\"TextRun Underlined SCXW72525651 BCX8\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW72525651 BCX8\" data-ccp-charstyle=\"Hyperlink\">Microsoft Security<\/span><\/span><\/a><span class=\"TextRun SCXW72525651 BCX8\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW72525651 BCX8\">) and <\/span><span class=\"NormalTextRun SCXW72525651 BCX8\">X<\/span> <span class=\"NormalTextRun SCXW72525651 BCX8\">(<\/span><\/span><a class=\"Hyperlink SCXW72525651 BCX8\" href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><span class=\"TextRun Highlight Underlined SCXW72525651 BCX8\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW72525651 BCX8\" data-ccp-charstyle=\"Hyperlink\">@MSFTSecurity<\/span><\/span><\/a><span class=\"TextRun Highlight Underlined SCXW72525651 BCX8\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW72525651 BCX8\" data-ccp-charstyle=\"Hyperlink\">)<\/span><\/span><span class=\"TextRun Highlight SCXW72525651 BCX8\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW72525651 BCX8\">\u202ffor the latest news and updates on cybersecurity.<\/span><\/span><\/em><\/p>\n<p> READ MORE <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/security-compliance-and-identity\/strengthening-identity-protection-in-the-face-of-highly\/ba-p\/4006009\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Get the latest information on our engineering advancements and continued commitments to secure identities as part of the Secure Future Initiative.<br \/>\nThe post Strengthening identity protection in the face of highly sophisticated attacks appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":54867,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[],"class_list":["post-54866","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Strengthening identity protection in the face of highly sophisticated attacks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Strengthening identity protection in the face of highly sophisticated attacks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-12T17:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/techcommunity.microsoft.com\/t5\/image\/serverpage\/image-id\/533710iC02EF8C7DA77BE9F\/image-size\/original?v=v2&amp;px=-1\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Strengthening identity protection in the face of highly sophisticated attacks\",\"datePublished\":\"2023-12-12T17:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks\\\/\"},\"wordCount\":1236,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks.png\",\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks\\\/\",\"name\":\"Strengthening identity protection in the face of highly sophisticated attacks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks.png\",\"datePublished\":\"2023-12-12T17:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks.png\",\"width\":850,\"height\":567},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Strengthening identity protection in the face of highly sophisticated attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Strengthening identity protection in the face of highly sophisticated attacks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Strengthening identity protection in the face of highly sophisticated attacks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-12-12T17:00:00+00:00","og_image":[{"url":"https:\/\/techcommunity.microsoft.com\/t5\/image\/serverpage\/image-id\/533710iC02EF8C7DA77BE9F\/image-size\/original?v=v2&amp;px=-1","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Strengthening identity protection in the face of highly sophisticated attacks","datePublished":"2023-12-12T17:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks\/"},"wordCount":1236,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks.png","articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks\/","url":"https:\/\/www.threatshub.org\/blog\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks\/","name":"Strengthening identity protection in the face of highly sophisticated attacks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks.png","datePublished":"2023-12-12T17:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks.png","width":850,"height":567},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/strengthening-identity-protection-in-the-face-of-highly-sophisticated-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Strengthening identity protection in the face of highly sophisticated attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54866","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=54866"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54866\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/54867"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=54866"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=54866"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=54866"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}