Tech Brewed
Welcome to Tech Brewed, your go-to podcast for the latest in technology products, training, and tips. Whether you're a tech enthusiast or a business professional, our show offers valuable insights into the ever-evolving world of technology.
What We Cover
Home and Business Technology Products
We delve into the latest gadgets and tools that can enhance your home and business environments. From smart home devices to enterprise-level solutions, we keep you updated on the best products for your needs.
Technology Training and Tips
Our episodes are packed with practical advice and training tips to help you maximize your tech investments. Whether you want to improve your cybersecurity or optimize your workflow, we've got you covered.
Creative Technology Software and AI
In today's digital age, creative technology software and artificial intelligence are game-changers. We explore how these innovations transform various industries and offer insights into their practical applications.
Featured Segments
AI and Its Impact
Discover how AI is changing the workplace and driving innovation. Our discussions range from improving audio quality with AI to extending life through advanced technologies.
Practical AI
Our goal is to make artificial intelligence accessible and practical for everyone. We break down complex topics into easy-to-understand segments, ensuring you stay ahead of the curve.
Join us on Tech Brewed for a deep dive into the tech world, where we blend expert knowledge with practical advice to help you navigate the digital landscape. Subscribe now and stay informed on the latest trends and innovations!
Tech Brewed
How Hackers Bypass Microsoft 365 MFA with Sophisticated New Phishing Attacks
Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.
Welcome back to Tech Brewed! In today’s episode, host Greg Doig dives into a sophisticated new phishing campaign that has cybersecurity experts raising alarms. This isn’t your run-of-the-mill password theft—attackers are now cleverly bypassing Microsoft 365’s multi-factor authentication using a tricky method known as the OAuth 2.0 device code flow. Even if you’re following best practices, these threat actors may still find a way in, targeting key industries like tech, manufacturing, and financial services.
We’ll explore exactly how this attack works, the red flags you need to recognize, and practical steps to protect yourself and your organization. So, whether you’re an IT professional or just someone wanting to stay safe online, grab your favorite brew and tune in. It’s time to outsmart the latest cyber threats together!
Subscribe to the weekly tech newsletter at https://gregdoig.com
Welcome back, tech enthusiasts. I'm your host, Greg Doig, and thanks for tuning in. Today we're talking about a sophisticated new phishing campaign that's causing quite a stir in the cybersecurity world. And here's the scary part. It can bypass Microsoft 365 multi-factor authentication. Yep. Even if you're doing everything right, attackers may still be able to sneak in. Let's unpack what's going on here. Most phishing attacks try to steal your username and password. Basic stuff. And with MFA turned on, you've usually got a strong safety net. But this new attack, well, it plays by a different rulebook. Threat actors are now abusing something called the OAuth 2.0 device authorization grant flow, often just called the device code flow. Normally, this is used legitimately by devices like smart TVs or command line tools that don't have a full sign-in interface. Here's the twist. The attackers send you an actual Microsoft page, not a fake one, and ask you to enter a device code they provide. Once you do that and complete your MFA, the attackers intercept the resulting authentication tokens in real time. That means they get access without ever touching your password. And worse, they get persistent access to Outlook, Teams, OneDrive, SharePoint, and even some admin-level capabilities. The campaign has been active since late 2025 and is heavily concentrated in North America, especially the United States. And the industries being targeted, no surprise here, tech, manufacturing, financial services. These are sectors where attackers know the data is valuable and the access is lucrative. So how can you spot one of these attacks? Here are some red flags to watch for. You're suddenly asked to enter a device code to verify your identity. An email or phone call claims to be from IT and pressures you to log in immediately. You get an MFA prompt you didn't initiate, or a workflow feels off, especially if it appears out of nowhere. This attack relies heavily on social engineering, timing, and credibility. The attacker's goal is
simple:make you think you're doing something legitimate. Now here's how you can protect yourself and your organization. Ready? 1, never enter a device code unless you personally initiated it. 2, decline MFA prompts you didn't request. 3, verify URLs before logging in, even if they look familiar. 4, report suspicious emails immediately. Don't wait. 5, if you think you might have interacted with one of these attacks, contact IT as soon as possible. Token theft can be reversed, but only if we know it's happened. This phishing campaign is a perfect reminder that cyber threats continue to evolve, and even our best defenses can be manipulated. But with awareness, vigilance, and quick reporting, we can stay ahead of attacks like these. If you found this helpful, make sure to subscribe, share this episode with your friends and teammates, and help someone else stay secure today. I'm Greg Doig. Once again, thanks for listening. Stay safe, stay skeptical, and I'll talk to you soon.
Podcasts we love
Check out these other fine podcasts recommended by us, not an algorithm.
Tech It Out
Radio America
My First Million
Hubspot Media
The Startup Ideas Podcast
Greg Isenberg
Lex Fridman Podcast
Lex Fridman
The Rest Is History
Goalhanger