A surge in phishing attacks exploiting Microsoft’s OAuth device code flow has been identified by Proofpoint
First seen on infosecurity-magazine.com
Jump to article: www.infosecurity-magazine.com/news/oauth-phishing-campaigns/
![]()
A surge in phishing attacks exploiting Microsoft’s OAuth device code flow has been identified by Proofpoint
First seen on infosecurity-magazine.com
Jump to article: www.infosecurity-magazine.com/news/oauth-phishing-campaigns/
![]()