Device code phishing attacks that abuse the OAuth 2.0 Device Authorization Grant flow to hijack accounts have surged more than 37 times this year. In this type of attack, the threat actor sends a ...
Add Yahoo as a preferred source to see more of our stories on Google. Microsoft users warned of EvilTokens 2FA code attacks. NurPhoto via Getty Images If you have yet to hear of the EvilTokens ...
Add Yahoo as a preferred source to see more of our stories on Google. Microsoft users warned of EvilTokens 2FA code attacks. NurPhoto via Getty Images If you have yet to hear of the EvilTokens ...
In embracing device code phishing, attackers trick victims into handing over account access by using a service's legitimate ...
A new phishing-as-a-service (PhaaS) campaign is abusing Microsoft’s device code authentication flow to gain unauthorized access to user accounts. Sekoia researchers first spotted the toolkit ...
Threat actors using a previously undocumented phishing-as-a-service (PhaaS) platform called "VENOM" are targeting credentials ...
A global phishing campaign targeting Microsoft 365 bypasses security codes using a legitimate login feature, impacting ...
Microsoft Incident Response – Detection and Response Team (DART) researchers observed an emerging, financially motivated ...
Compare the best multi-factor authentication software in 2026. See which MFA tools offer adaptive security, easy setup, and real customer identity protection.