BSidesPGH 2024 Track 2 Federico Cedolini Exfiltrating your M365 Data with OAuth Apps

Описание к видео BSidesPGH 2024 Track 2 Federico Cedolini Exfiltrating your M365 Data with OAuth Apps

There is no doubt that our files and emails contain a wealth of information and value. As such, they are a desirable target for threat actors. So, how can threat actors get a copy of them? This talk will explore the usage of OAuth applications as a method of data exfiltration in Microsoft 365 environments and how administrator can minimize the risk of unauthorized OAuth apps.

Комментарии

Информация по комментариям в разработке