home.social

Search

1000 results for “dev”

  1. Device Code Phishing is an Evolution in Identity Takeover

    Device code phishing attacks have exploded across the threat landscape, with new toolkits emerging weekly. This surge coincides with publicly released criminal toolkits and multiple phishing-as-a-service offerings like EvilTokens and Tycoon. Threat actors abuse the OAuth 2.0 device authorization grant flow to compromise Microsoft 365 and other enterprise accounts by tricking users into authorizing malicious applications. Current implementations use on-demand code generation, addressing the 15-minute expiration limitation of previous techniques. Most activity appears to be generated using AI-based coding techniques. Successful attacks lead to full account takeover, data theft, business email compromise, and potential ransomware deployment. The technique represents the natural evolution of credential phishing as organizations improve their defenses against traditional multifactor authentication bypass methods.

    Pulse ID: 6a05af080ae591ea2bf00e87
    Pulse Link: otx.alienvault.com/pulse/6a05a
    Pulse Author: AlienVault
    Created: 2026-05-14 11:16:24

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DataTheft #Email #InfoSec #Microsoft #MultiFactorAuthentication #OTX #OpenThreatExchange #Phishing #RAT #RansomWare #bot #AlienVault

  2. Device Code Phishing is an Evolution in Identity Takeover

    Device code phishing attacks have exploded across the threat landscape, with new toolkits emerging weekly. This surge coincides with publicly released criminal toolkits and multiple phishing-as-a-service offerings like EvilTokens and Tycoon. Threat actors abuse the OAuth 2.0 device authorization grant flow to compromise Microsoft 365 and other enterprise accounts by tricking users into authorizing malicious applications. Current implementations use on-demand code generation, addressing the 15-minute expiration limitation of previous techniques. Most activity appears to be generated using AI-based coding techniques. Successful attacks lead to full account takeover, data theft, business email compromise, and potential ransomware deployment. The technique represents the natural evolution of credential phishing as organizations improve their defenses against traditional multifactor authentication bypass methods.

    Pulse ID: 6a05af080ae591ea2bf00e87
    Pulse Link: otx.alienvault.com/pulse/6a05a
    Pulse Author: AlienVault
    Created: 2026-05-14 11:16:24

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DataTheft #Email #InfoSec #Microsoft #MultiFactorAuthentication #OTX #OpenThreatExchange #Phishing #RAT #RansomWare #bot #AlienVault

  3. Device Code Phishing is an Evolution in Identity Takeover

    Device code phishing attacks have exploded across the threat landscape, with new toolkits emerging weekly. This surge coincides with publicly released criminal toolkits and multiple phishing-as-a-service offerings like EvilTokens and Tycoon. Threat actors abuse the OAuth 2.0 device authorization grant flow to compromise Microsoft 365 and other enterprise accounts by tricking users into authorizing malicious applications. Current implementations use on-demand code generation, addressing the 15-minute expiration limitation of previous techniques. Most activity appears to be generated using AI-based coding techniques. Successful attacks lead to full account takeover, data theft, business email compromise, and potential ransomware deployment. The technique represents the natural evolution of credential phishing as organizations improve their defenses against traditional multifactor authentication bypass methods.

    Pulse ID: 6a05af080ae591ea2bf00e87
    Pulse Link: otx.alienvault.com/pulse/6a05a
    Pulse Author: AlienVault
    Created: 2026-05-14 11:16:24

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DataTheft #Email #InfoSec #Microsoft #MultiFactorAuthentication #OTX #OpenThreatExchange #Phishing #RAT #RansomWare #bot #AlienVault

  4. Device Code Phishing is an Evolution in Identity Takeover

    Device code phishing attacks have exploded across the threat landscape, with new toolkits emerging weekly. This surge coincides with publicly released criminal toolkits and multiple phishing-as-a-service offerings like EvilTokens and Tycoon. Threat actors abuse the OAuth 2.0 device authorization grant flow to compromise Microsoft 365 and other enterprise accounts by tricking users into authorizing malicious applications. Current implementations use on-demand code generation, addressing the 15-minute expiration limitation of previous techniques. Most activity appears to be generated using AI-based coding techniques. Successful attacks lead to full account takeover, data theft, business email compromise, and potential ransomware deployment. The technique represents the natural evolution of credential phishing as organizations improve their defenses against traditional multifactor authentication bypass methods.

    Pulse ID: 6a05af080ae591ea2bf00e87
    Pulse Link: otx.alienvault.com/pulse/6a05a
    Pulse Author: AlienVault
    Created: 2026-05-14 11:16:24

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DataTheft #Email #InfoSec #Microsoft #MultiFactorAuthentication #OTX #OpenThreatExchange #Phishing #RAT #RansomWare #bot #AlienVault

  5. Device Code Phishing is an Evolution in Identity Takeover

    Device code phishing attacks have exploded across the threat landscape, with new toolkits emerging weekly. This surge coincides with publicly released criminal toolkits and multiple phishing-as-a-service offerings like EvilTokens and Tycoon. Threat actors abuse the OAuth 2.0 device authorization grant flow to compromise Microsoft 365 and other enterprise accounts by tricking users into authorizing malicious applications. Current implementations use on-demand code generation, addressing the 15-minute expiration limitation of previous techniques. Most activity appears to be generated using AI-based coding techniques. Successful attacks lead to full account takeover, data theft, business email compromise, and potential ransomware deployment. The technique represents the natural evolution of credential phishing as organizations improve their defenses against traditional multifactor authentication bypass methods.

    Pulse ID: 6a05af080ae591ea2bf00e87
    Pulse Link: otx.alienvault.com/pulse/6a05a
    Pulse Author: AlienVault
    Created: 2026-05-14 11:16:24

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DataTheft #Email #InfoSec #Microsoft #MultiFactorAuthentication #OTX #OpenThreatExchange #Phishing #RAT #RansomWare #bot #AlienVault

  6. You better checksum yo' self before you wrecksum yo' self 🫳🏻🎤👨🏻‍💻

    #Development

  7. You better checksum yo' self before you wrecksum yo' self 🫳🏻🎤👨🏻‍💻

    #Development

  8. You better checksum yo' self before you wrecksum yo' self 🫳🏻🎤👨🏻‍💻

    #Development

  9. You better checksum yo' self before you wrecksum yo' self 🫳🏻🎤👨🏻‍💻

    #Development

  10. You better checksum yo' self before you wrecksum yo' self 🫳🏻🎤👨🏻‍💻

    #Development

  11. [アップデート] AWS SAM CLI 1.160.0 で CloudFormation Language Extensions(Fn::ForEach)がサポートされたので試してみた
    dev.classmethod.jp/articles/sa

    #dev_classmethod

  12. [アップデート] AWS SAM CLI 1.160.0 で CloudFormation Language Extensions(Fn::ForEach)がサポートされたので試してみた
    dev.classmethod.jp/articles/sa

    #dev_classmethod

  13. AWS Lake Formation はどう進化してきたのか – データレイク権限管理からAmazon SageMaker Lakehouse のガバナンス基盤へ
    dev.classmethod.jp/articles/20

    #dev_classmethod

  14. AWS Lake Formation はどう進化してきたのか – データレイク権限管理からAmazon SageMaker Lakehouse のガバナンス基盤へ
    dev.classmethod.jp/articles/20

    #dev_classmethod

  15. Developers if you haven't tested your #WordPress plugin against 7.0, put down that slice 🍕 and check out at the Field Guide before doing your checks. Useful.

    make.wordpress.org/core/2026/0

    Meantime, let me know if you're going to finish that pizza.

    🤔

  16. Developer: Bullethead Games
    Publisher: Bullethead Games

    Release date: To be announced

    Screenshots:

    #steam #gaming #videoGames #steamStorePage

  17. Developer: HiKing Mind
    Publisher: Second Maze

    Release date: 2027

    Screenshots:

    #steam #gaming #videoGames #steamStorePage

  18. Developer: So Romantic
    Publisher: So Romantic

    Release date: Coming soon

    Screenshots:

    #steam #gaming #videoGames #steamStorePage

  19. Fedora Hummingbird: Taking the Hummingbird model to the full operating system - Fedora Magazine fedoramagazine.org/fedora-humm

  20. PhD student position, Sugioka lab at UBC
    University of British Columbia

    PhD positions in the Sugioka Lab at , Vancouver. Interested in cell biology and live imaging using . elegans? Join us!

    See the full job description on jobRxiv: jobrxiv.org/job/university-of-

    .elegans ...
    jobrxiv.org/job/university-of-