Pivot via OAuth applications across tenants and how to protect/detect with Microsoft technology? (Midnight blizzard)

Recently threat actors like Midnight Blizzard use the OAuth applications in tenants that they can misuse for malicious activity. Actors use compromised user accounts to create/ modify and grant permissions to OAuth applications in tenants and move across test and … Continue reading Pivot via OAuth applications across tenants and how to protect/detect with Microsoft technology? (Midnight blizzard)