Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft to Block Unauthorized Scripts in Entra ID Logins with 2026 CSP Update

Posted on November 27, 2025November 27, 2025 By CWS

Nov 27, 2025Ravie LakshmananWeb Safety / Zero Belief
Microsoft has introduced plans to enhance the safety of Entra ID authentication by blocking unauthorized script injection assaults beginning a yr from now.
The replace to its Content material Safety Coverage (CSP) goals to boost the Entra ID sign-in expertise at “login.microsoftonline[.]com” by solely letting scripts from trusted Microsoft domains run.
“This replace strengthens safety and provides an additional layer of safety by permitting solely scripts from trusted Microsoft domains to run throughout authentication, blocking unauthorized or injected code from executing through the sign-in expertise,” the Home windows maker stated.
Particularly, it solely permits script downloads from Microsoft trusted CDN domains and inline script execution from a Microsoft trusted supply. The up to date coverage is restricted to browser-based sign-in experiences for URLs starting with login.microsoftonline.com. Microsoft Entra Exterior ID won’t be affected.

The change, which has been described as a proactive measure, is a part of Microsoft’s Safe Future Initiative (SFI) and is designed to safeguard customers in opposition to cross-site scripting (XSS) assaults that make it doable to inject malicious code into web sites. It is anticipated to be rolled out globally beginning mid-to-late October 2026.
Microsoft is urging organizations to check their sign-in flows completely forward of time to make sure that there are not any points and the sign-in expertise has no friction.
It is also advising clients to chorus from utilizing browser extensions or instruments that inject code or script into the Microsoft Entra sign-in expertise. Those that comply with this method are really useful to change to different instruments that do not inject code.
To establish any CSP violations, customers can undergo a sign-in circulate with the dev console open and entry the browser’s Console device throughout the developer instruments to test for errors that say “Refused to load the script” for going in opposition to the “script-src” and “nonce” directives.

Microsoft’s SFI is a multi-year effort that seeks to place safety above all else when designing new merchandise and higher put together for the rising sophistication of cyber threats.
It was first launched in November 2023 and expanded in Could 2024 following a report from the U.S. Cyber Security Assessment Board (CSRB), which concluded that the corporate’s “safety tradition was insufficient and requires an overhaul.”
In its third progress report printed this month, the tech large stated it has deployed over 50 new detections in its infrastructure to focus on high-priority ways, strategies, and procedures, and that the adoption of phishing-resistant multi-factor authentication (MFA) for customers and gadgets has hit 99.6%.

Different notable modifications enacted by Microsoft are as follows –

Enforced Necessary MFA throughout all companies, together with for all Azure service customers
Launched Automated restoration capabilities through Fast Machine Restoration, expanded passkey and Home windows Howdy assist, and improved reminiscence security in UEFI firmware and drivers by utilizing Rust
Migrated 95% of Microsoft Entra ID signing VMs to Azure Confidential Compute and moved 94.3% of Microsoft Entra ID safety token validation to its customary identification Software program Improvement Equipment (SDK)
Discontinued the usage of Energetic Listing Federation Providers (ADFS) in our productiveness surroundings
Decommissioned 560,000 further unused and aged tenants and 83,000 unused Microsoft Entra ID apps throughout Microsoft manufacturing and productiveness environments
Superior menace searching by centrally monitoring 98% of manufacturing infrastructure
Achieved full community system stock and mature asset lifecycle administration
Nearly solely locked code signing to manufacturing identities
Revealed 1,096 CVEs, together with 53 no-action cloud CVEs, and paid out $17 million in bounties

“To align with Zero Belief rules, organizations ought to automate vulnerability detection, response, and remediation utilizing built-in safety instruments and menace intelligence,” Microsoft stated. “Sustaining real-time visibility into safety incidents throughout hybrid and cloud environments permits quicker containment and restoration.”

The Hacker News Tags:Block, CSP, Entra, Logins, Microsoft, Scripts, Unauthorized, Update

Post navigation

Previous Post: Qilin RaaS Exposed 1 Million Files and 2 TB of Data Linked to Korean MSP Breach
Next Post: Asahi Data Breach Impacts 2 Million Individuals

Related Posts

UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats The Hacker News
6 Steps to 24/7 In-House SOC Success The Hacker News
China-Linked APT41 Hackers Target U.S. Trade Officials Amid 2025 Negotiations The Hacker News
Why Organizations Are Abandoning Static Secrets for Managed Identities The Hacker News
Why Your AI Security Tools Are Only as Strong as the Data You Feed Them The Hacker News
Europol Disrupts NoName057(16) Hacktivist Group Linked to DDoS Attacks Against Ukraine The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware
  • Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers
  • CISA Warns of Google Chromium 0-Day Vulnerability Exploited in Attacks
  • CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks
  • Rust-Based Luca Stealer Spreads Across Linux and Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware
  • Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers
  • CISA Warns of Google Chromium 0-Day Vulnerability Exploited in Attacks
  • CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks
  • Rust-Based Luca Stealer Spreads Across Linux and Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark