Microsoft 365 Direct Send Abuse: When Trusted Infrastructure Turns Malicious
Discover how attackers abuse Microsoft Direct Send to bypass secure email gateways and learn how behavioral AI stops advanced threats automatically.

Security teams are under siege.
Attackers are abusing Microsoft Direct Send to bypass secure email gateways and deliver QR code and CAPTCHA-hidden payloads straight to inboxes—no stolen credentials required. Legacy tools can’t keep up, leaving organizations exposed.
In this ThreatStream webinar, Abnormal experts break down real Direct Send attacks, show how adversaries exploit trusted infrastructure, and demonstrate how behavioral AI detects and remediates threats missed by SEGs.
Watch the on-demand webinar to learn:
- What Direct Send abuse is—and why it evades traditional defenses
- How attackers weaponize QR codes, CAPTCHAs, and lookalike domains
- How Abnormal’s behavioral AI stops these attacks automatically
Fill out the form to view the webinar.
Speakers

After viewing this resource, you are eligible for 1 CPE credit through ISC2.
Watch Now
Discover How It All Works
See How Abnormal AI Protects Humans
Learn More About AI