📘
DFIR
Search...
Ctrl + K
Enterprise Architecture
The Cloud
Azure
Securing Azure
Previous
Admin
Next
CA Policies
Last updated
7 months ago
Disable Legacy Authentication:
Token Tactics:
Case Studies:
Legacy authentication: The curious case of BAV2ROPC
Red Canary
Why You Should Block Microsoft Legacy Authentication
SoftwareKeep
Token tactics: How to prevent, detect, and respond to cloud token theft | Microsoft Security Blog
Microsoft Security Blog
Addressing Data Exfiltration: Token Theft Talk
TECHCOMMUNITY.MICROSOFT.COM
Microsoft Breach — What Happened? What Should Azure Admins Do?
Posts By SpecterOps Team Members
Midnight Blizzard breach: analysis and best practices | Wiz Blog
Wiz.io