BEC attack techniques are exploiting Microsoft 365 loopholes

Researchers have warned that business email compromise (BEC) attack techniques are exploiting Microsoft 365 ‘out of office’ and ‘read receipt’ message loopholes. This way, they are able to bypass the