Criminals are using stolen email addresses to distribute malicious OAuth Apps These apps steal sensitive data and redirect ...
Threat actors are abusing Microsoft 365 infrastructure in a BEC campaign, and target its users in two brand impersonation campaigns.