The One Font BEC campaign targets Microsoft 365 users and uses sophisticated obfuscation tactics to slip past security protections to harvest credentials.
https://threatpost.com/tiny-font-size-email-filters-bec-phishing/176198/
Joseph Carson, Chief Security Scientist at ThycoticCentrify, offers a 7-step practical IR checklist for ensuring a swift recovery from a cyberattack.
https://threatpost.com/incident-response-plan-security-disaster/175335/