
BEC attack techniques are exploiting Microsoft 365 loopholes
Researchers have warned that business email compromise (BEC) attack techniques are exploiting Microsoft 365 ‘out of office’ and ‘read receipt’ message loopholes. This way, they are able to bypass the