

Criminals called employees pretending to be IT support and sent real-time fake login pages. This let them break into Microsoft 365, Google, Salesforce, and file systems.
Source: TechRadar
More fake helpdesk calls, fake device setup requests, and MFA “approval spam” attacks—especially where SMS codes are still used.