Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Ghost in the Machine: How a Multi-Stage Phishing Campaign Evades Security to Steal Microsoft 365 Credentials

Since November 3, 2025, KnowBe4 Threat Labs has been monitoring a highly sophisticated, multi-stage phishing operation that is actively targeting organizations to steal employees’ Microsoft 365 credentials. The campaign has been engineered to bypass traditional email security defenses, such as secure email gateways (SEGs), and multi-factor authentication (MFA) tools.

Maximizing Microsoft Sensitivity Labels in Purview, SharePoint and other Microsoft 365 apps

Data governance and protection are crucial in safeguarding sensitive information. Proper classification and data labeling are essential to ensure that the right people access the right information. Failure to implement these practices can result in data breaches, financial losses, and reputational harm. To help with this, Microsoft offers sensitivity labels that classify and protect data as part of the compliance and security capabilities of Microsoft Purview Information Protection in Microsoft 365.

Implementing Zero Trust Architecture in Microsoft 365 to Counter Evolving Cloud Threats in 2025

In an era where cloud adoption has become ubiquitous, the security paradigms of the past are no longer sufficient. Traditional perimeter-based defenses, which assume trust once inside the network, have given way to more dynamic models. Zero Trust Architecture (ZTA) stands at the forefront of this shift, operating on the principle of "never trust, always verify." This approach is particularly critical for Microsoft 365 (M365) environments, which encompass a suite of productivity tools like Exchange Online, SharePoint, Teams, and OneDrive, all hosted in the cloud.

Maximizing Security and Compliance in Microsoft 365: A Guide to Shared Responsibility

In the ever-evolving landscape of digital work environments, Microsoft Office 365 stands as a cornerstone for over a million global companies, as highlighted by a recent Statista report (2024). This ubiquitous tool has become indispensable for organizations navigating hybrid work models and global economies, harnessing its collaborative capabilities alongside the imperative need for robust data protection strategies.

Microsoft 365 security best practices

Statistics suggest that over 3 million companies are using Microsoft 365 as their office productivity tool. This is almost 30% of the market share. Such a reliance on a vast platform like Microsoft 365 requires appropriate security measures. These can range from conditional access policies, strong access controls, authentication mechanisms, and monitoring capabilities to complete backup and disaster recovery solutions in place.

Microsoft 365: What Are Your Duties Within The Shared Responsibility Model

Microsoft operates under the Shared Responsibility Model. This means that certain areas of security tasks are your duties, as a customer, and some are the cloud provider’s while others may be a shared responsibility. Most importantly, Microsoft is responsible for its global infrastructure, including each data center and the uptime of the Microsoft 365 service. Your responsibility as the user is to manage and protect your customer data within the Microsoft ecosystem.

Microsoft 365 Backup Best Practices

Did you know that the average cost of an outage can be as high as $9K per minute? Risks concerning your Office 365 data range from accidental deletions and ransomware to service outages. In 2025, we already witnessed a number of outages happening throughout the year. On March 1, several key services such as Outlook, Teams, and even Azure were disrupted. It is reported that 30K Outlook users, 150 Microsoft Teams users, and 24K Office 365 users were affected by this.

Managing Microsoft Teams the right way: Balancing freedom and control

Microsoft Teams has become the standard tool for digital collaboration in companies, public institutions and organizations alike. The platform offers all the functions modern teams need: Chat, meetings, file storage, project collaboration and more – fundamentally changing the way we work together across states and countries. But despite all the enthusiasm, Teams is not without its drawbacks – especially when used without proper control.

Is Microsoft 365 GCC High Needed for CMMC Certification?

CMMC is a strict certification, but there’s also a lot of variation within its security controls and the demands it makes of agencies looking to achieve that certification. The standards are high, especially at the higher levels of CMMC, but there are also many tools and platforms available to meet those needs appropriately, without reinventing the wheel from base principles. Businesses need the tools necessary to function in a modern digital world.