Posted on
in Presentations
Users are prompted to login at the real Microsoft login page, real domain, real cert, and also have MFA enabled. But they've just been phished by a new attack that abuses the OAuth authorization protocol. The attacker is not stopped by the MFA controls and has full access to all of the Microsoft data including Office and Azure. This session will show how to detect and mitigate these phishing attacks.
Hackers & Threats Identity
cloud security hackers & threats identity management & governance phishing access control
Topic
Hackers & Threats
Identity
Subtopic
cloud security
hackers & threats
identity management & governance
phishing
access control
Share With Your Community