#M365Security

Paxion CybersecurityPaxionCyber
2025-06-26

⚠️ TeamFiltration, a legitimate pen-test tool, is being used to hack Microsoft Teams, Outlook, and OneDrive.

🧑‍💻 UNK_SneakyStrike targeted 80K+ accounts without phishing, exploiting tokens and OneDrive backdoors.

🛡️ We detect and stop these threats.

www.PhinIT.dePhinIT
2025-04-18

🔐 Conditional Access Templates bringen 2025 Zero‑Trust in Minutenschnelle. Microsoft‑managed Policies stoppen Legacy Auth & Device‑Code‑Flows automatisch.
👉 Erfahre, was es mit den neuen Richtlinien auf sich hat!

phinit.de/2025/04/18/condition

Volexity :verified:volexity@infosec.exchange
2025-02-13

@volexity recently identified multiple Russian threat actors targeting users via #socialengineering + #spearphishing campaigns with Microsoft 365 Device Code authentication (a well-known technique) with alarming success: volexity.com/blog/2025/02/13/m

#dfir #threatintel #m365security

Pen Test PartnersPTP@infosec.exchange
2024-11-27

Phishing attacks are getting smarter, but you can stay ahead. In the final part of Rachel Rabin’s blog series, find practical advice to spot and stop email threats in Microsoft 365: pentestpartners.com/security-b

Here’s what’s inside:

🔍Understanding how phishing emails bypass existing controls and fine-tune your anti-malware policies.

📊 Configure Defender for Office and Defender for Cloud Apps with customised threat and alert policies to effectively prevent and detect email-based attacks.

⚡ Go beyond default settings—use KQL to identify noisy policies and refine rule scope or sensitivity for better precision.

#PhishingPrevention #EmailSecurity #Microsoft365 #CyberThreats #CyberSecurityTips #StaySecure #PhishingAwareness #M365Security #CyberResilience #SpotThePhish

Pen Test PartnersPTP@infosec.exchange
2024-11-08

In Part 2 of our BEC-ware the Phish blog series, Rachel Rabin dives into the crucial steps for responding to and remediating Business Email Compromise (BEC) incidents in M365. 💻

We'll delve into the key response actions to contain a live attacker, looking at the complexities of token revocation and password resets in hybrid environments.

An effective response requires a proactive setup. Implement pre-configured response accounts and automation to take actions consistently and without delay.

Short-term remediations help get back to business as usual, and our long-term suggestions will protect against future phishing attacks.

We'll explore hardening measures such as Conditional Access policies, phishing-resistant authentication, token protections, and app consent policies to protect against AiTM and OAuth phishing frameworks.

Lastly, we'll look at dedicated controls to protect privileged accounts from phishing, such as cloud-only identity for cloud administrative activities.

Get the full technical breakdown in the latest blog: pentestpartners.com/security-b

#CyberSecurity #BusinessEmailCompromise #M365Security #PhishingProtection #InfoSec #CloudSecurity #ZeroTrust #TechCommunity

Eric Woodruff [MS MVP] :donor:ericonidentity@infosec.exchange
2023-07-21

Bouncing back to this place after a bit of time away.

Wrote a blog article earlier this week on #paw - not the kind cats have.

#entra #entraid #aad #azuread #azure #m365security #infosec #identity

ericonidentity.com/2023/07/17/

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst