New Solution Guide: Find and Fix Ten Hidden Cybersecurity Misconfigurations in 2026
Download Now
John Dominguez is a Senior Director of Product Marketing at Reach Security. He has over 13 years experience in cybersecurity product marketing, technology messaging and positioning, go-to-market strategy and campaigns, content creation, and product launches. In his previous role at Splunk, John led security product marketing throughout five years of rapid growth with coverage across nine products and services, including Splunk SOAR, SIEM, UEBA, Attack Analyzer, Mission Control, AI Assistant for Security, Security Essentials, Splunk Threat Research Team, and Splunk SURGe. Prior to Splunk, John spent seven years at Cisco marketing endpoint security, intrusion prevention, firewall, threat intelligence, and malware analysis products.
Recent research from Proofpoint highlights a growing trend in identity-based attacks. Rather than stealing passwords or exploiting software flaws, multiple threat actors are now abusing legitimate Microsoft authentication workflows to gain access to Microsoft 365 accounts at scale. This technique, known as device code phishing, is not new. What is new is how widespread the technique has become, particularly among both state-aligned and financially motivated adversaries. More importantly, it underscores a recurring theme in modern security incidents. The attack succeeds not because a control failed, but because it was not properly configured to stop this behavior.
A recent Dark Reading article highlighted a sobering shift in how nation-state threat actors are gaining access to critical infrastructure. According to reporting on a new Amazon Threat Intelligence disclosure, Russian actors affiliated with the GRU have spent years refining a campaign that increasingly bypasses traditional vulnerability exploitation altogether. Instead, they are walking straight through the front door left open by misconfigured network edge devices.
To join the community of customers enjoying the benefits of Reach and learn more about how it can transform your security posture, visit:
© 2026 Reach Security.
Terms of use