![Device code phishing concept image showing cartoon cell phone with a hook attached to a sign-in page.](https://cdn.mos.cms.futurecdn.net/6UMt7L8cwrivqQPjJWN3eX-200-80.jpg)
Hackers are using this new phishing technique to bypass MFA
News Microsoft has warned that a threat group known as Storm-2372 has altered its tactics using a specific ‘device code phishing’ technique to bypass MFA and steal access tokens.
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.
By Daniel Todd published
News Schneider will leverage Nozomi’s security solutions to deliver enhanced managed security services to key industrial sectors
By Nicole Kobie published
News HPE has criticized the US Department of Justice's attempt to block its acquisition of Juniper Networks, claiming it will benefit competitors such as Cisco.
By Nicole Kobie published
News OpenAI CEO Sam Altman claimed the company has been 'on the wrong side of history' regarding the open source debate.
By ITPro published
Whitepaper Agile risk management starts with a common language
By ITPro published
Whitepaper Actionable insight for IT decision-makers to drive business success today and tomorrow
By ITPro published
Whitepaper A buyer's guide for meeting the unprecedented speed and complexity of today's development practices
By ITPro published
Whitepaper A buyer's guide for meeting the unprecedented speed and complexity of today's development practices
By George Fitzmaurice published
Aimed at boosting efficiency in the UK, the Data Use and Access Bill is designed to cut red tape around data use.
By Max Slater-Robins published
In-depth Lower latency and better security controls have to be balanced against more limited outputs
By Bernard Montel published
Industry Insights The democratization of AI has forced channel partners to evolve from security product resellers to strategic cyber resilience advisors
By Rory Bathgate published
Opinion Ambition on energy doesn’t keep the lights on and hyperscalers should focus on reliable renewables rather than the false hope of a new nuclear age
By Dave Mitchell published
Reviews Some compromises to keep the price down but the U7 Pro delivers the best remote management services on the planet
By Dave Mitchell published
Reviews An affordable cloud file sharing platform with huge appeal to a wide range of businesses seeking strict access security, integral document management, and automated workflows
By Dave Mitchell published
Reviews A purpose-built backup appliance that delivers a high storage capacity for the price, heaps of data backup and recovery features, and solid ransomware protection
By Simon Handby published
Reviews If your small office needs color pages in a hurry, Canon's i-SENSYS LBP732Cdw is ready and willing
By Rory Bathgate published
ITPro Podcast Firms focused on AI at the edge and open source LLMs could reap massive rewards from the Chinese startup's industry upset
By Rory Bathgate published
ITPro Podcast The Chinese startup's efficiency gains could undermine compute demands from the biggest names in tech
By Rory Bathgate published
ITPro Podcast Project DIGITS promises to put the power of local LLMs on the desks of developers
By Rory Bathgate published
Podcast Rural businesses are still offered speeds far below the UK government’s gigabit target
By Dale Walker published
ITPro 20/20 The technology, policies, and markets likely to shape IT decision-making in the year ahead
By Dale Walker published
ITPro 20/20 A look at the shady world of cyber security networking and online communities
By Dale Walker published
ITPro 20/20 Issue 32 looks at the problems that can arise when businesses choose to embrace flashy terminology at the expense of simplification
By Dale Walker published
ITPro 20/20 Advancements in the core technology mean holograms could soon become instrumental in eliminating the worst aspects of hybrid work