- Популярные видео
- Авто
- Видео-блоги
- ДТП, аварии
- Для маленьких
- Еда, напитки
- Животные
- Закон и право
- Знаменитости
- Игры
- Искусство
- Комедии
- Красота, мода
- Кулинария, рецепты
- Люди
- Мото
- Музыка
- Мультфильмы
- Наука, технологии
- Новости
- Образование
- Политика
- Праздники
- Приколы
- Природа
- Происшествия
- Путешествия
- Развлечения
- Ржач
- Семья
- Сериалы
- Спорт
- Стиль жизни
- ТВ передачи
- Танцы
- Технологии
- Товары
- Ужасы
- Фильмы
- Шоу-бизнес
- Юмор
The Phishing Attack That Makes MFA Useless
Learn how device code phishing works and how to detect it: https://www.huntress.com/resources/what-is-device-code-phishing?utm_source=youtube&utm_medium=social
Security Operations Analyst Luke Wilkinson breaks down device code phishing. Attackers abuse a legitimate Microsoft authentication flow built for printers and smart TVs, trick users into completing a real MFA prompt, and walk away with a valid access token to your Microsoft 365 account (no password required). That token can stay valid for 90 days, giving attackers silent access to email, Teams, OneDrive, and SharePoint. The good news: it's detectable if you're watching the right signals in your identity layer.
🔍 Topics: device code phishing | Microsoft 365 | MFA bypass | OAuth token theft | identity threat detection | Huntress SOC | M365 security
———
We wreck hackers. Huntress is a purpose-built platform for organizations like yours, all backed and operated by our industry-proven, 24/7 AI-assisted SOC for continuous threat protection.
We are enterprise-grade cybersecurity for ALL businesses.
Learn more about how Huntress fights cyber threats: https://www.huntress.com/why-huntress?utm_source=youtube&utm_medium=social
Видео The Phishing Attack That Makes MFA Useless канала Huntress
Security Operations Analyst Luke Wilkinson breaks down device code phishing. Attackers abuse a legitimate Microsoft authentication flow built for printers and smart TVs, trick users into completing a real MFA prompt, and walk away with a valid access token to your Microsoft 365 account (no password required). That token can stay valid for 90 days, giving attackers silent access to email, Teams, OneDrive, and SharePoint. The good news: it's detectable if you're watching the right signals in your identity layer.
🔍 Topics: device code phishing | Microsoft 365 | MFA bypass | OAuth token theft | identity threat detection | Huntress SOC | M365 security
———
We wreck hackers. Huntress is a purpose-built platform for organizations like yours, all backed and operated by our industry-proven, 24/7 AI-assisted SOC for continuous threat protection.
We are enterprise-grade cybersecurity for ALL businesses.
Learn more about how Huntress fights cyber threats: https://www.huntress.com/why-huntress?utm_source=youtube&utm_medium=social
Видео The Phishing Attack That Makes MFA Useless канала Huntress
Комментарии отсутствуют
Информация о видео
Вчера, 1:26:01
00:03:13
Другие видео канала




![We don't get fooled again [by MAC Defender]](https://i.ytimg.com/vi/ja5KiZBajsw/default.jpg)
















