
Phishing in the age of O365 and EntraID: New ways to reach familiar targets!
Even in modern environments, there are ways and means to obtain your or your employees' access data using phishing.
Topic
Awareness / Phishing / FraudCloud SecurityIdentity and access management
When & Where
Details
Format:
Technology lecture
Session description
Have you already activated a second factor to log in to EntraID? Very good. Then you are already one step ahead of some other companies. Nevertheless, some successful techniques have been developed over the last few years that allow attackers to obtain access data. And that despite properly set up second factor.
In this talk, NSIDE ATTACK LOGIC shows these attacks and how they work. Additionally, it provides a deep insight into the mindset of modern attackers and what threats may be on the horizon in the future.
In this talk, NSIDE ATTACK LOGIC shows these attacks and how they work. Additionally, it provides a deep insight into the mindset of modern attackers and what threats may be on the horizon in the future.
Speaker
Moderator
