Topic: conditional access policies
-
Microsoft 365 Users Hit by Sneaky Device Code Phishing
Attackers are exploiting Microsoft's device code authorization flow to bypass multi-factor authentication, tricking users into granting account access via fraudulent login portals. The campaigns are scaled using readily available red team tools like Squarephish and Graphish, which automate phishi...
Read More »