Dec. 19, 2023, 6:45 p.m. | Farah Iyer

Security Boulevard securityboulevard.com

Recent findings from Microsoft Threat Intelligence reveal a concerning trend: threat actors exploiting vulnerabilities in Microsoft 365 and Azure environments to execute attacks, with a focus on OAuth application abuse. In this blog post, we explore two incidents included in Microsoft’s findings. We explore the actions involved in each and the measures you can take […]


The post Securing Against OAuth Exploitation: A Step-By-Step Guide appeared first on Obsidian Security.


The post Securing Against OAuth Exploitation: A Step-By-Step Guide …

abuse account compromise actions application attacks azure blog blog post environments exploitation exploiting featured findings focus guide incidents intelligence microsoft microsoft 365 microsoft 365 security microsoft threat intelligence oauth oauth application abuse reveal saas security saas security posture security guidance session hijacking sspm threat threat actors threat intelligence trend vulnerabilities

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Associate Principal Security Engineer

@ Activision Blizzard | Work from Home - CA

Security Engineer- Systems Integration

@ Meta | Bellevue, WA | Menlo Park, CA | New York City

Lead Security Engineer (Digital Forensic and IR Analyst)

@ Blue Yonder | Hyderabad

Senior Principal IAM Engineering Program Manager Cybersecurity

@ Providence | Redmond, WA, United States

Information Security Analyst II or III

@ Entergy | The Woodlands, Texas, United States