📘
DFIR
Ctrl
K
Copy
Enterprise Architecture
The Cloud
Azure
Securing Azure
Disable Legacy Authentication:
Legacy authentication: The curious case of BAV2ROPC
Red Canary
Why You Should Block Microsoft Legacy Authentication
softwarekeep.com
Token Tactics:
Token tactics: How to prevent, detect, and respond to cloud token theft | Microsoft Security Blog
Microsoft Security Blog
Addressing data exfiltration: Token theft talk | Microsoft Community Hub
TECHCOMMUNITY.MICROSOFT.COM
Case Studies:
Microsoft Breach — What Happened? What Should Azure Admins Do?
Medium
Midnight Blizzard breach: analysis and best practices | Wiz Blog
Wiz.io
Previous
Admin
Next
CA Policies
Last updated
1 year ago