Microsoft Entra Token Theft - Part One: Offline Access and Conditional Access
A walkthrough of different Token Theft Scenarios with Detections
Threat Hunting entra microsoft threat hunting
A walkthrough of different Token Theft Scenarios with Detections
Detecting abuse of VSCode Remote Tunnels for C2 and persistence by threat actors
How threat actors abuse Microsoft Dev Tunnels for C2 communication and detection strategies
A practical guide to implementing threat hunting in a SOC environment and moving beyond reactive detection