bars
📘
DFIR
search
circle-xmark
⌘
Ctrl
k
copy
Copy
chevron-down
Enterprise Architecture
chevron-right
The Cloud
chevron-right
Azure
Hunting
Hunting in Azure subscriptions | Microsoft Community Hub
TECHCOMMUNITY.MICROSOFT.COM
chevron-right
Azure Attack Paths Management
Sofblocks
chevron-right
Exploring Azure Cloud Attack Vectors In 2024 — Compromising Sensitive Storage Account Containers
Medium
chevron-right
MURKY PANDA: Trusted-Relationship Cloud Threat | CrowdStrike
CrowdStrike.com
chevron-right
https://www.elastic.co/docs/reference/security/prebuilt-rules/rules/integrations/azure/persistence_azure_global_administrator_role_assigned
www.elastic.co
chevron-right
Office365 Attacks: Bypassing MFA, Achieving Persistence and More - Part I
www.inversecos.com
chevron-right
Attacks on Azure AD and M365: Pawning the cloud, PTA Skeleton Keys and more - PART II
www.inversecos.com
chevron-right
Previous
Azure
chevron-left
Next
Admin
chevron-right
Last updated
4 months ago