Are you sure you want to leave? You're just one step away from your free network consultation (valued at $495).
Threat Actors Leverage File-Sharing Service and Reverse Proxies for Credential Harvesting
The use of a reverse proxy in this phishing campaign allows the attackers to bypass multi-factor authentication (MFA) and gain access to victims’ Microsoft 365 accounts, leading to further distribution of phishing emails.