Skip Navigation
Get a Demo
 
 
 
 
 
 
 
 
 
Resources Videos
Threat intelligence

Red Canary Office Hours: Episode 3 – Phishing attacks leveraging M365 Device Code Authentication and How often do bad things happen?

Air Date: February 18, 2025

Phishing attacks leveraging M365 Device Code Authentication

Keith and Dave are live from our company kickoff in Dallas! They reveal a key stat from our upcoming Threat Detection Report on the annual impact of high-severity threats.

They also explore a new wave of phishing attacks exploiting M365 Device Code Authentication.

View the video
Red Canary Office Hours: Episode 44 – Naughty or nice: decoding normal vs. anomalous behavior
Red Canary Office Hours: Episode 44 – Naughty or nice: decoding normal vs. anomalous behavior
Red Canary Office Hours: Episode 43 – Defense-in-depth strategies to keep you warm
Red Canary Office Hours: Episode 43 – Defense-in-depth strategies to keep you warm
Red Canary Office Hours: Episode 42 – A cornucopia of Intelligence Insights
Red Canary Office Hours: Episode 42 – A cornucopia of Intelligence Insights
Red Canary Office Hours: Episode 41 – Bird feed: How Red Canary names and tracks threats
Red Canary Office Hours: Episode 41 – Bird feed: How Red Canary names and tracks threats

Security gaps? We got you.

Sign up for our monthly email newsletter for expert insights on MDR, threat intel, and security ops—straight to your inbox.


 
 
Back to Top