Mitiga Threat Detection: Browser-in-the-middle (BiTM) Cloud Attack Example
Austin Bollinger, Principal Incident Responder at Mitiga, explores how a threat actor could steal information from one of your users' browsers to gain further information across your entire tenant or organization.
This example underscores the importance of securing OAuth flows and carefully managing the permissions granted to browser extensions.
Read the blog post from Austin and other members of the research team: https://www.mitiga.io/blog/hunting-conditional-access-policy-bypass-in-the-wild
Read more research on our blog: https://www.mitiga.io/blog
Follow Mitiga on LinkedIn: https://www.linkedin.com/company/mitiga-io/
#ThreatDetection #OAuth
Видео Mitiga Threat Detection: Browser-in-the-middle (BiTM) Cloud Attack Example канала Mitiga
This example underscores the importance of securing OAuth flows and carefully managing the permissions granted to browser extensions.
Read the blog post from Austin and other members of the research team: https://www.mitiga.io/blog/hunting-conditional-access-policy-bypass-in-the-wild
Read more research on our blog: https://www.mitiga.io/blog
Follow Mitiga on LinkedIn: https://www.linkedin.com/company/mitiga-io/
#ThreatDetection #OAuth
Видео Mitiga Threat Detection: Browser-in-the-middle (BiTM) Cloud Attack Example канала Mitiga
Комментарии отсутствуют
Информация о видео
13 февраля 2025 г. 1:22:00
00:03:27
Другие видео канала