Загрузка...

Tycoon2FA Is Bypassing MFA Through Real Microsoft Pages | Sync Up

Most of us trust a Microsoft login page when the address looks right and MFA works as expected. But a new phishing attack shows why a real login page can still be tied to the wrong request. We’ll take a look at device code phishing and the threat it presents as we sit down and sync up with Rocket IT’s weekly technology update.

In this episode, you’ll hear more about:

How the Tycoon2FA phishing platform is using device code phishing to target Microsoft 365 accounts

Why a real Microsoft login page and a legitimate MFA prompt can still be part of a phishing attack

How attackers trick users into approving access to their own accounts without ever entering a fake website

What access tokens are, and why obtaining them can give attackers a foothold in your email, files, and business data

The three questions every employee should ask before entering a Microsoft device login code

What business leaders and IT teams can do to review and strengthen Microsoft 365 access controls

VIDEO LINKS
* https://rocketit.com/contact

ENGAGE
* Subscribe to our YouTube: https://www.youtube.com/channel/UCN9APgMOZ4Ec-VIxltYDg1Q?sub_confirmation=1
* Leave a comment and thumbs up the video

CONNECT
* Website: https://rocketit.com/
* LinkedIn: https://www.linkedin.com/company/rocket-it/

Видео Tycoon2FA Is Bypassing MFA Through Real Microsoft Pages | Sync Up канала Rocket IT
Яндекс.Метрика
Все заметки Новая заметка Страницу в заметки
Страницу в закладки Мои закладки
На информационно-развлекательном портале SALDA.WS применяются cookie-файлы. Нажимая кнопку Принять, вы подтверждаете свое согласие на их использование.
О CookiesНапомнить позжеПринять