Device code phishing attacks that abuse the OAuth 2.0 Device Authorization Grant flow to hijack accounts have surged more than 37 times this year. In this type of attack, the threat actor sends a ...
The Microsoft Defender Security Research Team has confirmed that a pervasive new authentication code attack is compromising ...
The Microsoft Defender Security Research Team has confirmed that a pervasive new authentication code attack is compromising ...
In embracing device code phishing, attackers trick victims into handing over account access by using a service's legitimate ...
Threat actors using a previously undocumented phishing-as-a-service (PhaaS) platform called "VENOM" are targeting credentials ...
A new phishing-as-a-service (PhaaS) campaign is abusing Microsoft’s device code authentication flow to gain unauthorized access to user accounts. Sekoia researchers first spotted the toolkit ...
A global phishing campaign targeting Microsoft 365 bypasses security codes using a legitimate login feature, impacting ...
Microsoft Incident Response – Detection and Response Team (DART) researchers observed an emerging, financially motivated ...
Compare the best multi-factor authentication software in 2026. See which MFA tools offer adaptive security, easy setup, and ...
When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works. If you work as Director or a C-Suite at a major global organization, be on the lookout for a new ...
Attempts to restrict online access have increased across the world, making 2025 the highest on record for such curbs ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results