Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft MFA Faces Major Disruption with 504 Errors

Microsoft MFA Faces Major Disruption with 504 Errors

Posted on February 23, 2026 By CWS

Microsoft is currently addressing a significant issue impacting its Multi-Factor Authentication (MFA) feature within the Microsoft 365 suite. Users across North America are reporting 504 gateway timeout errors, hindering authentication processes and access to essential services.

Incident Overview

The problem, logged under the ID MO1237461, began on February 23, 2026, around 8:22 PM IST (2:52 PM UTC). The disruption primarily affects those attempting to authenticate via MFA, resulting in blocked access to Microsoft 365 applications and related services.

The 504 error suggests a failure in an upstream server, likely part of Microsoft’s authentication framework, which is unable to respond timely, thus causing the gateway to timeout. Microsoft has classified this as a service degradation, indicating intermittent access for some users depending on their request routing.

Impact on Users and Services

Currently limited to North America, the incident significantly impacts U.S.-based enterprises and organizations. As Microsoft 365 is widely used in corporate settings, services such as email, Teams, and SharePoint face potential disruptions. Furthermore, third-party applications relying on Microsoft Entra ID for authentication are also affected.

Conditional Access policies enforcing MFA compliance are at risk, possibly affecting device logins, VPN connections, and cloud application access. Microsoft’s recent updates reveal ongoing analysis of Entra ID logs and network telemetry to ascertain the root cause.

Response and Recommendations

Microsoft has released updates at various intervals, with the latest at 9:27 PM IST, highlighting ongoing investigations. The Entra ID, formerly Azure Active Directory, is crucial to Microsoft’s identity management, and the issue may involve an authentication gateway or backend component.

For organizations, MFA downtime presents a complex challenge. Disabling MFA for access restoration poses security risks, while enforcing it locks users out. IT admins should closely monitor the Microsoft 365 Service Health Dashboard under MO1237461 for real-time updates and consider temporary policy changes if necessary.

Microsoft’s public status page indicates operational services, but detailed incident information is available to tenants through the admin center.

Future Outlook

As Microsoft continues its investigation, users are advised to check the service health dashboard for updates. Options like trying different networks, devices, or browsers might help, but disabling MFA is not recommended for production accounts. For urgent issues, contacting Microsoft Support is advisable.

Follow Microsoft’s official @MSFT365Status on X for the latest updates. Stay informed through Google News, LinkedIn, and X for ongoing cybersecurity news.

Cyber Security News Tags:504 errors, Authentication, Entra ID, IT administrators, MFA, Microsoft, Microsoft 365, North America, service disruption, service health

Post navigation

Previous Post: Wendy’s Franchise Database Allegedly Compromised
Next Post: Cryptojacking Campaign Exploits Vulnerabilities with XMRig Miner

Related Posts

Multiple Schneider Electric Vulnerabilities Let Attackers Inject OS Commands Multiple Schneider Electric Vulnerabilities Let Attackers Inject OS Commands Cyber Security News
Hackers Hijacking VNC Connections to Gain Access to OT Control Devices in Critical Infrastructure Hackers Hijacking VNC Connections to Gain Access to OT Control Devices in Critical Infrastructure Cyber Security News
Cyber Startup Frenetik Launches Patented Deception Technology to Counter the AI Arms Race Cyber Startup Frenetik Launches Patented Deception Technology to Counter the AI Arms Race Cyber Security News
CISA Shares New Threat Detections for Actively Exploited WSUS Vulnerability CISA Shares New Threat Detections for Actively Exploited WSUS Vulnerability Cyber Security News
How To Detect Them Early  How To Detect Them Early  Cyber Security News
CISA Warns of Citrix NetScaler ADC and Gateway Vulnerability Actively Exploited in Attacks CISA Warns of Citrix NetScaler ADC and Gateway Vulnerability Actively Exploited in Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Anthropic Accuses Chinese AI Labs of Distillation Attacks
  • APT28’s Webhook Malware Targets Europe
  • GrayCharlie Targets WordPress Sites with Malicious Scripts
  • Starkiller Phishing Tool Bypasses MFA with Real Login Pages
  • MIMICRAT RAT Unveiled in Complex ClickFix Cyber Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Anthropic Accuses Chinese AI Labs of Distillation Attacks
  • APT28’s Webhook Malware Targets Europe
  • GrayCharlie Targets WordPress Sites with Malicious Scripts
  • Starkiller Phishing Tool Bypasses MFA with Real Login Pages
  • MIMICRAT RAT Unveiled in Complex ClickFix Cyber Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News