Go offline with the Player FM app!
Midnight Blizzard Attack on Microsoft
Manage episode 398356817 series 3498024
Summary
In this episode, the hosts discuss the midnight blizzard attack on Microsoft and the lessons that can be learned from it. They cover topics such as learning from security incidents at other organizations, the details of the attack, OAuth attacks, and OAuth security recommendations. The hosts emphasize the importance of auditing privileges, reviewing OAuth applications, and implementing strong security measures to prevent similar attacks. They also highlight the need for organizations to move faster and be more proactive in their cybersecurity efforts.
Takeaways
- Learn from security incidents at other organizations to make your own organization safer.
- Audit the privileges of all identities in your organization and review OAuth applications.
- Implement strong security measures, such as disabling user consent to apps and using conditional access.
- Move faster and be more proactive in your cybersecurity efforts.
-------------------------------------------
Youtube Video Link:
-------------------------------------------
Documentation:
----------------------
Contact Us:
Threads: https://www.threads.net/@bluesecuritypodcast
-------------------------------------------
Andy Jaw
-------------------------------------------
Adam Brewer
Email: adam@bluesecuritypod.com
218 episodes
Manage episode 398356817 series 3498024
Summary
In this episode, the hosts discuss the midnight blizzard attack on Microsoft and the lessons that can be learned from it. They cover topics such as learning from security incidents at other organizations, the details of the attack, OAuth attacks, and OAuth security recommendations. The hosts emphasize the importance of auditing privileges, reviewing OAuth applications, and implementing strong security measures to prevent similar attacks. They also highlight the need for organizations to move faster and be more proactive in their cybersecurity efforts.
Takeaways
- Learn from security incidents at other organizations to make your own organization safer.
- Audit the privileges of all identities in your organization and review OAuth applications.
- Implement strong security measures, such as disabling user consent to apps and using conditional access.
- Move faster and be more proactive in your cybersecurity efforts.
-------------------------------------------
Youtube Video Link:
-------------------------------------------
Documentation:
----------------------
Contact Us:
Threads: https://www.threads.net/@bluesecuritypodcast
-------------------------------------------
Andy Jaw
-------------------------------------------
Adam Brewer
Email: adam@bluesecuritypod.com
218 episodes
All episodes
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.