all InfoSec news
Azure AD Token Forging Technique in Microsoft Attack Extends Beyond Outlook, Wiz Reports
July 21, 2023, 3:14 p.m. | info@thehackernews.com (The Hacker News)
The Hacker News thehackernews.com
According to cloud security company Wiz, the inactive Microsoft account (MSA) consumer signing key used to forge Azure Active Directory (Azure AD or AAD) tokens to gain illicit access to Outlook Web Access (OWA) and
account active directory actor attack azure azure active directory azure ad beyond chinese cloud cloud security consumer directory email forge infrastructure key microsoft nation nation-state actor outlook reports scope security signing signing key state storm storm-0558 thought token wiz
More from thehackernews.com / The Hacker News
10 Critical Endpoint Security Tips You Should Know
2 days, 5 hours ago |
thehackernews.com
North Korea's Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
2 days, 23 hours ago |
thehackernews.com
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Network Security Engineer
@ Meta | Menlo Park, CA | Remote, US
Security Engineer, Investigations - i3
@ Meta | Washington, DC
Threat Investigator- Security Analyst
@ Meta | Menlo Park, CA | Seattle, WA | Washington, DC
Security Operations Engineer II
@ Microsoft | Redmond, Washington, United States
Engineering -- Tech Risk -- Global Cyber Defense & Intelligence -- Bug Bounty -- Associate -- Dallas
@ Goldman Sachs | Dallas, Texas, United States