📘
DFIR
More
Search
Ctrl + K
Securing Azure
Previous
Admin
Next
CA Policies
Last updated
6 months ago
Disable Legacy Authentication:
Token Tactics:
Case Studies:
Why You Should Block Microsoft Legacy Authentication
SoftwareKeep
Legacy authentication: The curious case of BAV2ROPC
Red Canary
Addressing Data Exfiltration: Token Theft Talk
TECHCOMMUNITY.MICROSOFT.COM
Token tactics: How to prevent, detect, and respond to cloud token theft | Microsoft Security Blog
Microsoft Security Blog
Midnight Blizzard breach: analysis and best practices | Wiz Blog
Wiz.io
Microsoft Breach — What Happened? What Should Azure Admins Do?
Posts By SpecterOps Team Members