📘
DFIR
Ctrl
K
Copy
Enterprise Architecture
The Cloud
Azure
Attacking Azure
Persistence
Office365 Attacks: Bypassing MFA, Achieving Persistence and More - Part I
www.inversecos.com
Attacks on Azure AD and M365: Pawning the cloud, PTA Skeleton Keys and more - PART II
www.inversecos.com
Previous
M365 Business Email Compromise
Next
Cloud VMs
Last updated
28 days ago