Search
1000 results for “dev”
-
Device Code Phishing is an Evolution in Identity Takeover
Device code phishing attacks have exploded across the threat landscape, with new toolkits emerging weekly. This surge coincides with publicly released criminal toolkits and multiple phishing-as-a-service offerings like EvilTokens and Tycoon. Threat actors abuse the OAuth 2.0 device authorization grant flow to compromise Microsoft 365 and other enterprise accounts by tricking users into authorizing malicious applications. Current implementations use on-demand code generation, addressing the 15-minute expiration limitation of previous techniques. Most activity appears to be generated using AI-based coding techniques. Successful attacks lead to full account takeover, data theft, business email compromise, and potential ransomware deployment. The technique represents the natural evolution of credential phishing as organizations improve their defenses against traditional multifactor authentication bypass methods.
Pulse ID: 6a05af080ae591ea2bf00e87
Pulse Link: https://otx.alienvault.com/pulse/6a05af080ae591ea2bf00e87
Pulse Author: AlienVault
Created: 2026-05-14 11:16:24Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #DataTheft #Email #InfoSec #Microsoft #MultiFactorAuthentication #OTX #OpenThreatExchange #Phishing #RAT #RansomWare #bot #AlienVault
-
Device Code Phishing is an Evolution in Identity Takeover
Device code phishing attacks have exploded across the threat landscape, with new toolkits emerging weekly. This surge coincides with publicly released criminal toolkits and multiple phishing-as-a-service offerings like EvilTokens and Tycoon. Threat actors abuse the OAuth 2.0 device authorization grant flow to compromise Microsoft 365 and other enterprise accounts by tricking users into authorizing malicious applications. Current implementations use on-demand code generation, addressing the 15-minute expiration limitation of previous techniques. Most activity appears to be generated using AI-based coding techniques. Successful attacks lead to full account takeover, data theft, business email compromise, and potential ransomware deployment. The technique represents the natural evolution of credential phishing as organizations improve their defenses against traditional multifactor authentication bypass methods.
Pulse ID: 6a05af080ae591ea2bf00e87
Pulse Link: https://otx.alienvault.com/pulse/6a05af080ae591ea2bf00e87
Pulse Author: AlienVault
Created: 2026-05-14 11:16:24Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #DataTheft #Email #InfoSec #Microsoft #MultiFactorAuthentication #OTX #OpenThreatExchange #Phishing #RAT #RansomWare #bot #AlienVault
-
Device Code Phishing is an Evolution in Identity Takeover
Device code phishing attacks have exploded across the threat landscape, with new toolkits emerging weekly. This surge coincides with publicly released criminal toolkits and multiple phishing-as-a-service offerings like EvilTokens and Tycoon. Threat actors abuse the OAuth 2.0 device authorization grant flow to compromise Microsoft 365 and other enterprise accounts by tricking users into authorizing malicious applications. Current implementations use on-demand code generation, addressing the 15-minute expiration limitation of previous techniques. Most activity appears to be generated using AI-based coding techniques. Successful attacks lead to full account takeover, data theft, business email compromise, and potential ransomware deployment. The technique represents the natural evolution of credential phishing as organizations improve their defenses against traditional multifactor authentication bypass methods.
Pulse ID: 6a05af080ae591ea2bf00e87
Pulse Link: https://otx.alienvault.com/pulse/6a05af080ae591ea2bf00e87
Pulse Author: AlienVault
Created: 2026-05-14 11:16:24Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #DataTheft #Email #InfoSec #Microsoft #MultiFactorAuthentication #OTX #OpenThreatExchange #Phishing #RAT #RansomWare #bot #AlienVault
-
Device Code Phishing is an Evolution in Identity Takeover
Device code phishing attacks have exploded across the threat landscape, with new toolkits emerging weekly. This surge coincides with publicly released criminal toolkits and multiple phishing-as-a-service offerings like EvilTokens and Tycoon. Threat actors abuse the OAuth 2.0 device authorization grant flow to compromise Microsoft 365 and other enterprise accounts by tricking users into authorizing malicious applications. Current implementations use on-demand code generation, addressing the 15-minute expiration limitation of previous techniques. Most activity appears to be generated using AI-based coding techniques. Successful attacks lead to full account takeover, data theft, business email compromise, and potential ransomware deployment. The technique represents the natural evolution of credential phishing as organizations improve their defenses against traditional multifactor authentication bypass methods.
Pulse ID: 6a05af080ae591ea2bf00e87
Pulse Link: https://otx.alienvault.com/pulse/6a05af080ae591ea2bf00e87
Pulse Author: AlienVault
Created: 2026-05-14 11:16:24Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #DataTheft #Email #InfoSec #Microsoft #MultiFactorAuthentication #OTX #OpenThreatExchange #Phishing #RAT #RansomWare #bot #AlienVault
-
Device Code Phishing is an Evolution in Identity Takeover
Device code phishing attacks have exploded across the threat landscape, with new toolkits emerging weekly. This surge coincides with publicly released criminal toolkits and multiple phishing-as-a-service offerings like EvilTokens and Tycoon. Threat actors abuse the OAuth 2.0 device authorization grant flow to compromise Microsoft 365 and other enterprise accounts by tricking users into authorizing malicious applications. Current implementations use on-demand code generation, addressing the 15-minute expiration limitation of previous techniques. Most activity appears to be generated using AI-based coding techniques. Successful attacks lead to full account takeover, data theft, business email compromise, and potential ransomware deployment. The technique represents the natural evolution of credential phishing as organizations improve their defenses against traditional multifactor authentication bypass methods.
Pulse ID: 6a05af080ae591ea2bf00e87
Pulse Link: https://otx.alienvault.com/pulse/6a05af080ae591ea2bf00e87
Pulse Author: AlienVault
Created: 2026-05-14 11:16:24Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #DataTheft #Email #InfoSec #Microsoft #MultiFactorAuthentication #OTX #OpenThreatExchange #Phishing #RAT #RansomWare #bot #AlienVault
-
You better checksum yo' self before you wrecksum yo' self 🫳🏻🎤👨🏻💻
-
You better checksum yo' self before you wrecksum yo' self 🫳🏻🎤👨🏻💻
-
You better checksum yo' self before you wrecksum yo' self 🫳🏻🎤👨🏻💻
-
You better checksum yo' self before you wrecksum yo' self 🫳🏻🎤👨🏻💻
-
You better checksum yo' self before you wrecksum yo' self 🫳🏻🎤👨🏻💻
-
[アップデート] AWS SAM CLI 1.160.0 で CloudFormation Language Extensions(Fn::ForEach)がサポートされたので試してみた
https://dev.classmethod.jp/articles/sam-cli-1-160-foreach/ -
[アップデート] AWS SAM CLI 1.160.0 で CloudFormation Language Extensions(Fn::ForEach)がサポートされたので試してみた
https://dev.classmethod.jp/articles/sam-cli-1-160-foreach/ -
AWS Lake Formation はどう進化してきたのか – データレイク権限管理からAmazon SageMaker Lakehouse のガバナンス基盤へ
https://dev.classmethod.jp/articles/20260514-aws-lake-formation-evolution/ -
AWS Lake Formation はどう進化してきたのか – データレイク権限管理からAmazon SageMaker Lakehouse のガバナンス基盤へ
https://dev.classmethod.jp/articles/20260514-aws-lake-formation-evolution/ -
AWS CDK の BucketDeployment が作成するカスタムリソース Lambda の Amazon Inspector 検出を抑制する
https://dev.classmethod.jp/articles/suppress-amazon-inspector-findings-for-aws-cdk-bucketdeployment-lambda/ -
AWS CDK の BucketDeployment が作成するカスタムリソース Lambda の Amazon Inspector 検出を抑制する
https://dev.classmethod.jp/articles/suppress-amazon-inspector-findings-for-aws-cdk-bucketdeployment-lambda/ -
Devs Behind Outbound, One of Steam’s Most-Wishlisted Games, Respond After Asking Players to Change Negative Reviews and Kicking up a Stink Online
-
Bun's Rust rewrite has been merged
https://old.reddit.com/r/rust/comments/1tcrmjs/rewrite_bun_in_rust_has_been_merged/
#HackerNews #Bun #Rust #rewrite #merged #programming #news #RustLang #software #development
-
Developers if you haven't tested your #WordPress plugin against 7.0, put down that slice 🍕 and check out at the Field Guide before doing your checks. Useful.
https://make.wordpress.org/core/2026/05/14/wordpress-7-0-field-guide/
Meantime, let me know if you're going to finish that pizza.
🤔
-
Developer: Bullethead Games
Publisher: Bullethead GamesRelease date: To be announced
Screenshots:
-
Developer: HiKing Mind
Publisher: Second MazeRelease date: 2027
Screenshots:
-
Developer: So Romantic
Publisher: So RomanticRelease date: Coming soon
Screenshots:
-
Fedora Hummingbird: Taking the Hummingbird model to the full operating system - Fedora Magazine #devopsish https://fedoramagazine.org/fedora-hummingbird-linux-taking-the-hummingbird-model-to-the-full-os/
-
Fedora Hummingbird: Taking the Hummingbird model to the full operating system - Fedora Magazine #devopsish https://fedoramagazine.org/fedora-hummingbird-linux-taking-the-hummingbird-model-to-the-full-os/
-
⚡ Why are developers switching from JSON to JSON5?
Because modern projects need:
📝 Comments
✨ Cleaner syntax
🔧 Better maintainability
🚀 Faster development workflowsRead the full article 👇
https://medium.com/@99tools/why-developers-are-quietly-switching-from-json-to-json5-66260bcc5720
#Developers #JSON5 #Programming #TechCommunity #SoftwareEngineering #Code #WebDev #JavaScriptDeveloper #DeveloperExperience
-
devel/at-spi2-core: Makefile PLIST distinfo
ryoon: devel/at-spi2-core: Update to 2.60.3
http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/at-spi2-core/Makefile.diff?r1=1.66&r2=1.67
http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/at-spi2-core/PLIST.diff?r1=1.23&r2=1.24
http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/at-spi2-core/distinfo.diff?r1=1.37&r2=1.38 -
🔐 Active Supply Chain Attack: Malicious node-ipc Versions Published to npm
🔗 https://www.stepsecurity.io/blog/node-ipc-npm-supply-chain-attack
-
Developers of Party Animals Announce an AI Video Contest - Game Gets a Review Bomb
#videogames #indiegames #pcgaming #gaming #gamedev #genai #ai
-
PhD student position, Sugioka lab at UBC
University of British ColumbiaPhD positions in the Sugioka Lab at #UBC, Vancouver. Interested in cell biology and live imaging using #C. elegans? Join us!
See the full job description on jobRxiv: https://jobrxiv.org/job/university-of-british-columbia-27778-phd-student-position-sugioka-lab-at-ubc/
#C.elegans #cellbiology #developmenta...
https://jobrxiv.org/job/university-of-british-columbia-27778-phd-student-position-sugioka-lab-at-ubc/?fsp_sid=12129