Published on April 25, 2025. EST READ TIME: 2 minutes
In response to the 2023 Storm-0558 breach, where attackers exploited token signing vulnerabilities, Microsoft has taken significant steps to bolster its identity security infrastructure. The company has migrated its Microsoft Account (MSA) signing service to Azure Confidential Virtual Machines (VMs), providing enhanced hardware-based isolation for token signing processes. Additionally, Microsoft is transitioning its Entra ID signing services to the same secure environment.
These measures are part of Microsoft’s broader Secure Future Initiative, which includes storing access token signing keys in hardware security modules (HSMs) with automatic rotation. The initiative also reports that 90% of identity tokens for Microsoft apps are now validated using a hardened identity SDK, and 92% of employee productivity accounts employ phishing-resistant multifactor authentication. These enhancements aim to mitigate attack vectors similar to those used in the Storm-0558 incident, reinforcing Microsoft’s commitment to securing its digital ecosystem.
North Korea's Lazarus Group Rakes in $3 Million: Unveiling Cybercrime's Financial Motivations
Read More 2 min read
Security Vulnerability: Windows Hello Fingerprint Authentication Bypassed on Popular Laptops
Read More 2 min read
Indian Startup Hack-for-Hire: Navigating the Complexities of Ethical Hacking
Read More 2 min read
North Korean Hackers Pose as Job Recruiters in Cyber Espionage Campaign
Read More 2 min read
Analysis Reveals: Bad Bots Constitute a Staggering 73% of Internet Traffic
Read More 2 min read
Menu