Poor identity controls allow attackers to exploit Office 365

Sorry, this post has not been published yet, check again later!

October 15, 2020
Published by:

Enterprise Times

Vectra's Spotlight Report on Microsoft Office 365 showcases how Office 365 is attractive to cybercriminals because it provides a single gateway to infiltrate multiple applications. Matt Walmsley discusses how attackers utilize internal phishing, among other techniques, to perform lateral movement privilege escalation and reconnaissance behaviors.

Read publication

Most recent media coverage

30 Mins or Less: Rapid Attacks Extort Orgs Without Ransomware

October 13, 2021

Threatpost

Read more

Ransom Disclosure Act Would Require Victims to Disclose Ransom Payments Within 48 Hours

October 7, 2021

SECURITY Magazine

Read more

Successfully Influencing Employee Security Behavior

October 1, 2021

Security Boulevard

Read more