
Generative AI – driving business efficiency but also creating new cyber vulnerabilities, with Chris Fisher from Vectra AI
Cyber Uncut
00:00
Discussion on Security Vulnerabilities and Threat Actor Tactics in Complex Technologies
Exploration of a vulnerability in the Microsoft Graph API that enabled attackers to conduct identity theft through brute force attacks, shedding light on the intricacies of technology challenges and security blind spots. Discussion on the exploitation of user data within networks by threat actors, including the utilization of tools like co-pilot for malicious intentions.
Transcript
Play full episode