{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreidij2zrtd4cgw2ykgwkbdrr5gxhmfu36gk4sbkwhpp5d5wjfprmg4",
    "uri": "at://did:plc:iir655mcoipvnewhnkv6fb3u/app.bsky.feed.post/3mgphevj5koc2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreic2dc4pl3l2xa5cu6yebsnwmdy7ykrbws75j4izflk3bekc5liv5a"
    },
    "mimeType": "image/png",
    "size": 1565426
  },
  "path": "/cybersecurity-blog/oauth-device-code-phishing/",
  "publishedAt": "2026-03-10T11:18:42.000Z",
  "site": "https://any.run",
  "tags": [
    "link"
  ],
  "textContent": "\nOAuth Device Code phishing explained: how attackers steal M365 access tokens and how SSL decryption in ANY.RUN Sandbox helps detect it.",
  "title": "OAuth Device Code Phishing: A New Microsoft 365 Account Breach Vector"
}