Recently threat actors like Midnight Blizzard use the OAuth applications in tenants that they can misuse for malicious activity. Actors use compromised user accounts to create/ modify and grant permissions to OAuth applications in tenants and move across test and … Continue reading Pivot via OAuth applications across tenants and how to protect/detect with Microsoft technology? (Midnight blizzard)
Copy and paste this URL into your WordPress site to embed
Copy and paste this code into your site to embed