Hackers are exploiting trusted authentication flows, like Microsoft Teams and IoT logins, to trick users into handing over access tokens, bypassing MFA and slipping undetected into corporate networks.
First seen on darkreading.com
Jump to article: www.darkreading.com/vulnerabilities-threats/beware-device-code-phishing
![]()

