MICROSOFT 365 5
- OAuth Device Code Phishing Campaigns Surge Targets Microsoft 365
- Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks
- Exploiting Direct Send Attackers Abuse Microsoft 365 to Deliver Internal Phishing Attacks
- Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
- Global analysis of Adversary-in-the-Middle phishing threats