chat
expand_more

Microsoft 365 Direct Send Abuse: When Trusted Infrastructure Turns Malicious

Discover how attackers abuse Microsoft Direct Send to bypass secure email gateways and learn how behavioral AI stops advanced threats automatically.

Microsoft 365 Direct Send Abuse: When Trusted Infrastructure Turns Malicious

Security teams are under siege.

Attackers are abusing Microsoft Direct Send to bypass secure email gateways and deliver QR code and CAPTCHA-hidden payloads straight to inboxes—no stolen credentials required. Legacy tools can’t keep up, leaving organizations exposed.

In this ThreatStream webinar, Abnormal experts break down real Direct Send attacks, show how adversaries exploit trusted infrastructure, and demonstrate how behavioral AI detects and remediates threats missed by SEGs.

Watch the on-demand webinar to learn:

  • What Direct Send abuse is—and why it evades traditional defenses
  • How attackers weaponize QR codes, CAPTCHAs, and lookalike domains
  • How Abnormal’s behavioral AI stops these attacks automatically

Fill out the form to view the webinar.

Speakers

Jesus Garcia

Soultions Architect

Abnormal AI

Ryan Schwartz

Senior Manager, Product Marketing

Abnormal AI

Need an image here

After viewing this resource, you are eligible for 1 CPE credit through ISC2.

Watch Now

Discover How It All Works

See How Abnormal AI Protects Humans

Learn More About AI

Discover the Latest Abnormal AI Insights