Just as they did with PowerShell for Windows, threat actors are abusing native O365 capabilities for lateral movement, command-and-control communication, and other malicious activity.
Google Dorks Database |
Exploits Vulnerability |
Exploit Shellcodes |
CVE List |
Tools/Apps |
News/Aarticles |
Phishing Database |
Deepfake Detection |
Trends/Statistics & Live Infos |
Tags:
Microsoft Office 365 Accounts a Big Target for Attackers