Poor identity controls allow attackers to exploit Office 365

Sorry, this post has not been published yet, check again later!

October 15, 2020
Published by:

Enterprise Times

Vectra's Spotlight Report on Microsoft Office 365 showcases how Office 365 is attractive to cybercriminals because it provides a single gateway to infiltrate multiple applications. Matt Walmsley discusses how attackers utilize internal phishing, among other techniques, to perform lateral movement privilege escalation and reconnaissance behaviors.

Read publication

Most recent media coverage

Defending Against Modern Ransomware Tactics

January 5, 2022

Security Boulevard

Read more

7 of the Most Impactful Cybersecurity Incidents of 2021

December 23, 2021

Dark Reading

Read more

Attack Wipes 25 Years' Worth of Data from Local Electric Co.

December 7, 2021

Data Breach Today

Read more