In the modern Microsoft 365 threat landscape, SharePoint Online is no longer a document dump. It is a sprawling, API rich, over permissioned jungle wired into the core fabric of collaboration. With tight Graph API hooks, seamless integration with Teams, … Read the rest
In Microsoft Teams – “Attackers didn’t break in — they joined the meeting…”
Welcome to the frontline of enterprise collaboration compromise: Microsoft Teams. Once just a chat app, now a sprawling hub for files, apps, identities, secrets… and attackers. … Read the rest
Ransomware attacks grow and cripple companies, cities, and businesses. Attackers are locking people out of their networks and demanding significant payment to get back in. The case is that many organizations still pay attackers in order to get their data … Read the rest
Ransomware attacks grow and cripple companies, cities, and businesses. Attackers are locking people out of their networks and demanding significant payment to get back in. The situation that many organizations still pay attackers in order to get their data back.… Read the rest
This blog post focuses on bypassing Microsoft Defender for Cloud Apps (MDA) App Control. This bypassing method is one scenario of four that allows you to bypass session proxy. There are a few ways to restrict and prevent agent impersonation … Read the rest
There are two scans within Microsoft Cloud App Security; the first scan is what we call the “at rest scan,” so this one is ongoing and will scan your files from the oldest to the newest.