Have you already activated a second factor to log in to EntraID? Very good. Then you are already one step ahead of some other companies. Nevertheless, some successful techniques have been developed over the last few years that allow attackers to obtain access data. And that despite properly set up second factor.
In this talk, NSIDE ATTACK LOGIC shows these attacks and how they work. Additionally, it provides a deep insight into the mindset of modern attackers and what threats may be on the horizon in the future.