Microsoft 365 environments exploited in business email attacks
(scworld.com)
Attackers are conducting business email compromise (BEC) campaigns by exploiting the trusted infrastructure of Microsoft 365 to execute credential harvesting and account takeover (ATO).
Attackers are conducting business email compromise (BEC) campaigns by exploiting the trusted infrastructure of Microsoft 365 to execute credential harvesting and account takeover (ATO).