-
Microsoft 365 – The Art of Lateral Movement Via Delegate Access
Business Email Compromise A Business Email Compromise (BEC) is a type of cyber attack where the attacker gains access to a business email account and uses it to commit fraud or other malicious activities. The primary goal of a BEC is often financial gain, and the attackers typically employ social engineering techniques to deceive employees…
-
MOVEit Exploit – Detecting potential data transfer activity

If you haven’t heard already, the cybersecurity community has been buzzing with news of the recent zero-day exploit of the popular file transfer software called MOVEit. There is a wealth of indicators of compromise (IoC) and intelligence reports that can be used to sweep your endpoints. However, what is the end goal from the attacker’s…