Skip Navigation
Get a Demo
 
 
 
 
 
 
 
 
 
Resources Videos
Threat intelligence

Red Canary Office Hours: Episode 3 – Phishing attacks leveraging M365 Device Code Authentication and How often do bad things happen?

Air Date: February 18, 2025

Phishing attacks leveraging M365 Device Code Authentication

Keith and Dave are live from our company kickoff in Dallas! They reveal a key stat from our upcoming Threat Detection Report on the annual impact of high-severity threats.

They also explore a new wave of phishing attacks exploiting M365 Device Code Authentication.

View the video
Red Canary Office Hours: Episode 41 – Bird feed: How Red Canary names and tracks threats
Red Canary Office Hours: Episode 41 – Bird feed: How Red Canary names and tracks threats
Red Canary Office Hours: Episode 40 – The hidden tunnels of STORM-2603’s ransomware ops
Red Canary Office Hours: Episode 40 – The hidden tunnels of STORM-2603’s ransomware ops
Red Canary Office Hours: Episode 39 – Nightmare on supply chain street
Red Canary Office Hours: Episode 39 – Nightmare on supply chain street
Red Canary Office Hours: Episode 38 – September’s top threats, featuring Stef Rand from our Intelligence team!
Red Canary Office Hours: Episode 38 – September’s top threats, featuring Stef Rand from our Intelligence team!

Security gaps? We got you.

Sign up for our monthly email newsletter for expert insights on MDR, threat intel, and security ops—straight to your inbox.


 
 
Back to Top