Device code phishing attacks that abuse the OAuth 2.0 Device Authorization Grant flow to hijack accounts have surged more ...
A new wave of device code phishing shows how threat actors are scaling account compromise using AI and end‑to‑end automation.
The phishing-as-a-service toolkit leverages legitimate authentication to capture tokens and access Microsoft 365 services.
Cybercriminals and state-sponsored hackers are increasingly exploiting Microsoft’s legitimate OAuth 2.0 device authorization process to hijack enterprise accounts, bypassing multifactor authentication ...