home.social

#cloudforensics — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #cloudforensics, aggregated by home.social.

  1. With a rise in Adversary in the Middle (AiTM) phishing, we've seen attackers leverage trusted compromised accounts to launch multi-stage attacks and follow-on BEC activity. Too often, investigations end with "If only this data had been available!"

    We are kicking off our 3-part series on handling Business Email Compromise (BEC) incidents in Microsoft 365! 📧 In Part 1, Rachel dives into the key artefacts for investigating a BEC in M365 and where to find them.

    👉 pentestpartners.com/security-b

    This includes:

    Why enabling Unified Audit Logging is essential for tracking attackers.

    How to use Purview Content Search to analyse compromised mailboxes.

    Pro tips for using Defender's Advanced Hunting to quickly scope the scale of an attack.

    Stay tuned for more actionable insights in Parts 2 & 3!

    #CyberSecurity #BusinessEmailCompromise #M365 #IncidentResponse
    #MicrosoftDefender #EmailSecurity #DigitalForensics #DataRetention #ThreatHunting #CloudForensics

  2. Cado Security releases its H2 2023 Cloud Threat Findings Report to help security teams secure against cloud-focused threat actors. forensicfocus.com/news/cado-se #CadoSecurity #cloudforensics