Topic: proofpoint research

  • Microsoft 365 Users Hit by Sneaky Device Code Phishing

    Microsoft 365 Users Hit by Sneaky Device Code Phishing

    Attackers are exploiting Microsoft's device code authorization flow to bypass multi-factor authentication, tricking users into granting account access via fraudulent login portals. The campaigns are scaled using readily available red team tools like Squarephish and Graphish, which automate phishi...

    Read More »
  • Sextortion Spyware: Webcam Pics Snapped During Porn Viewing

    Sextortion Spyware: Webcam Pics Snapped During Porn Viewing

    A new spyware called Stealerium automates the capture of compromising images by monitoring online activity for adult content keywords and activating the webcam for blackmail. Unlike typical infostealers, Stealerium specifically targets intimate moments to gather deeply personal material, increasi...

    Read More »
  • Hijacked OAuth Apps: Your Cloud's Secret Backdoor

    Hijacked OAuth Apps: Your Cloud's Secret Backdoor

    Cybercriminals exploit internal OAuth applications to create persistent backdoors in corporate cloud systems, bypassing security measures like password resets and multi-factor authentication. Attackers deceive users into approving malicious OAuth apps or compromise admin accounts to create truste...

    Read More »