
Sign up to save your podcasts
Or


n this must-hear re-release of the TOSS C3 Podcast, cybersecurity expert and host Greg Hanna, joined by Neil, exposes one of the most dangerous and sophisticated phishing threats facing businesses today — the Evil Proxy attack targeting Microsoft 365 users.
This next-gen phishing scam uses deceptive domains and pixel-perfect replicas of Microsoft login pages to trick even the most cautious users into surrendering their credentials — including two-factor authentication codes. Once compromised, attackers gain full access to emails, files, and sensitive company data.
Neil breaks down:
How these attacks bypass traditional MFA defenses
Why your employees may never realize they’ve been hacked
The critical flaws in common cybersecurity practices
But this episode doesn’t stop at exposing the threat — it delivers the solution. Neil outlines an advanced defense strategy that includes:
✅ Enterprise-grade Endpoint Detection and Response (EDR)
✅ 24/7 Security Operations Center (SOC) monitoring
✅ A 3-tiered cybersecurity protection service trusted by Fortune 100 companies like Ford
This layered approach empowers organizations to detect, block, and respond to threats before real damage is done.
🎯 Call to Action:
If you're using Microsoft 365 — whether you're a startup or an enterprise — you need to hear this. Schedule a free cybersecurity consultation with expert Drake to assess your current defenses and build a roadmap to resilience.
Evil Proxy is here — are you ready for it?
Don’t wait until your inbox becomes ground zero.
By TOSS C3n this must-hear re-release of the TOSS C3 Podcast, cybersecurity expert and host Greg Hanna, joined by Neil, exposes one of the most dangerous and sophisticated phishing threats facing businesses today — the Evil Proxy attack targeting Microsoft 365 users.
This next-gen phishing scam uses deceptive domains and pixel-perfect replicas of Microsoft login pages to trick even the most cautious users into surrendering their credentials — including two-factor authentication codes. Once compromised, attackers gain full access to emails, files, and sensitive company data.
Neil breaks down:
How these attacks bypass traditional MFA defenses
Why your employees may never realize they’ve been hacked
The critical flaws in common cybersecurity practices
But this episode doesn’t stop at exposing the threat — it delivers the solution. Neil outlines an advanced defense strategy that includes:
✅ Enterprise-grade Endpoint Detection and Response (EDR)
✅ 24/7 Security Operations Center (SOC) monitoring
✅ A 3-tiered cybersecurity protection service trusted by Fortune 100 companies like Ford
This layered approach empowers organizations to detect, block, and respond to threats before real damage is done.
🎯 Call to Action:
If you're using Microsoft 365 — whether you're a startup or an enterprise — you need to hear this. Schedule a free cybersecurity consultation with expert Drake to assess your current defenses and build a roadmap to resilience.
Evil Proxy is here — are you ready for it?
Don’t wait until your inbox becomes ground zero.