Skip Navigation
Get a Demo
 
 
 
 
 
 
 
 
 
Resources Videos
Threat intelligence

Red Canary Office Hours: Episode 3 – Phishing attacks leveraging M365 Device Code Authentication and How often do bad things happen?

Air Date: February 18, 2025

Phishing attacks leveraging M365 Device Code Authentication

Keith and Dave are live from our company kickoff in Dallas! They reveal a key stat from our upcoming Threat Detection Report on the annual impact of high-severity threats.

They also explore a new wave of phishing attacks exploiting M365 Device Code Authentication.

View the video
Red Canary Office Hours: Episode 43 – Defense-in-depth strategies to keep you warm
Red Canary Office Hours: Episode 43 – Defense-in-depth strategies to keep you warm
Red Canary Office Hours: Episode 42 – A cornucopia of Intelligence Insights
Red Canary Office Hours: Episode 42 – A cornucopia of Intelligence Insights
Red Canary Office Hours: Episode 41 – Bird feed: How Red Canary names and tracks threats
Red Canary Office Hours: Episode 41 – Bird feed: How Red Canary names and tracks threats
Red Canary Office Hours: Episode 40 – The hidden tunnels of STORM-2603’s ransomware ops
Red Canary Office Hours: Episode 40 – The hidden tunnels of STORM-2603’s ransomware ops

Security gaps? We got you.

Sign up for our monthly email newsletter for expert insights on MDR, threat intel, and security ops—straight to your inbox.


 
 
Back to Top