A Russia-aligned threat group uses Microsoft 365 device code phishing to steal credentials and take over accounts, tracked ...
Multiple threat actors are compromising Microsoft 365 accounts in phishing attacks that leverage the OAuth device code ...
Cybercriminals, including state-sponsored threat actors, are increasingly abusing Microsoft ’s OAuth 2.0 device code ...
Financially motivated and nation-state threat groups are behind a surge in the use of device code phishing attacks that abuse Microsoft's legitimate OAuth 2.0 device authorization grant flow to trick ...
A surge in phishing campaigns abusing Microsoft’s OAuth device code authorization flow has been observed with multiple threat ...
Microsoft is killing off an obsolete and vulnerable encryption cipher that Windows has supported by default for 26 years ...
A new cybersecurity report says Microsoft leads all brands in phishing impersonation, with scams posing as support and ...
Your financial accounts should be the first to get a passkey upgrade before the new year. These logins move money, approve transfers and open the door to accounts you really don’t want someone else to ...
Phishing attacks in 2025 increasingly moved beyond email, with attackers using social platforms, search ads, and ...
Azure CTO Mark Russinovich’s annual “Inside Azure Innovations” presentations give us a look at cooling innovations, ...
React2Shell vulnerability CVE-2025-55182 is actively exploited to deploy Linux malware, run commands, and steal cloud ...
Telegram now supports passkey logins, letting users sign in with Face ID, Touch ID, or device PIN for faster, safer, and ...