Ongoing campaign compromises senior execs' Azure accounts, locks them using MFA
Briefly

The campaign attempts to compromise targeted Azure environments by sending account owners emails that integrate techniques for credential phishing and account takeovers.
Threat actors seemingly direct their focus toward a wide range of individuals holding diverse titles across different organizations, impacting hundreds of users globally.
Read at Ars Technica
[
|
]