In embracing device code phishing, attackers trick victims into handing over account access by using a service's legitimate new-device login flow.
Summary + source link. No paywalls, no tracking.
In embracing device code phishing, attackers trick victims into handing over account access by using a service's legitimate new-device login flow.