Microsoft 365 Accounts Get Sprayed by Mega-Botnet
The threat actors are exploiting non-interactive sign-ins, an authentication feature that security teams don’t typically monitor.
The threat actors are exploiting non-interactive sign-ins, an authentication feature that security teams don’t typically monitor.