<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Phishing on Azure Buddy Online</title><link>https://azurebuddy.online/tags/phishing/</link><description>Recent content in Phishing on Azure Buddy Online</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>© 2026 Arnold van Wijnbergen</copyright><lastBuildDate>Tue, 05 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://azurebuddy.online/tags/phishing/index.xml" rel="self" type="application/rss+xml"/><item><title>Breaking the Code: Multi-Stage ‘Code of Conduct’ Phishing Campaign Leads to AiTM Token Compromise</title><link>https://azurebuddy.online/blogs/multi-stage-code-of-conduct-phishing-aitm-token-compromise/</link><pubDate>Tue, 05 May 2026 00:00:00 +0000</pubDate><guid>https://azurebuddy.online/blogs/multi-stage-code-of-conduct-phishing-aitm-token-compromise/</guid><description>Breaking the code: How a multi-stage phishing campaign bypasses MFA # A recent Microsoft Security blog highlights a sophisticated phishing campaign that demonstrates how attackers are evolving beyond traditional credential theft.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://azurebuddy.online/blogs/multi-stage-code-of-conduct-phishing-aitm-token-compromise/featured.png"/></item></channel></rss>