| Websiste | https://lucienpannatier.ch |
| Bluesky | https://bsky.app/profile/bluewall.me |
| Pixelfed | https://pixel.infosec.exchange/bluewall |

| Websiste | https://lucienpannatier.ch |
| Bluesky | https://bsky.app/profile/bluewall.me |
| Pixelfed | https://pixel.infosec.exchange/bluewall |
My Ubuntu-certified HP EliteBook greeted me this morning with a lovely blue GRUB screen. Memory test, UEFI Firmware Settings, the works.
apt full-upgrade installed a new OEM kernel and Canonical forgot 3 lines of GRUB config in their package.
This is the kind of detail that kills the Linux desktop experience. On a *certified* laptop.
When you try to join a local cybersecurity association and they ask for your number to add you to the WhatsApp group.
Am I the only one seeing a slight consistency issue here? ๐
I wish I was kidding.
EvilTokens; new PhaaS actively targeting Microsoft 365 via Device Code Flow abuse.
The attack abuses the legitimate OAuth Device Authorization Grant. The attacker sends you a code, you enter it on the REAL microsoft.com/devicelogin page and they get your tokens. MFA bypassed. Password reset won't revoke access.
Check if the flow is used in your tenant:
Entra Sign-in logs โ filter "Authentication Protocol: Device code" โ Last 30 days โ check all 4 tabs.
All empty? You can block safely.
Block it:
Conditional Access โ New policy โ All users โ All resources โ Conditions: Authentication flows > Device code flow โ Grant: Block access โ ON.
Takes 5 minutes. Do it now.