CyberWire Daily cover image

Inside Jingle Thief Cloud Fraud Unwrapped [Threat Vector]

CyberWire Daily

00:00

Techniques for persistence in Microsoft 365

Stav outlines device registration, MFA bypass, and inbox forwarding rules attackers used to persist.

Play episode from 15:48
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app