
Episode 98: Current State of M365 Attacks: Initial Access
The Cyber Threat Perspective
00:00
Vulnerabilities of Legacy Authentication Protocols
This chapter highlights the vulnerabilities linked to outdated authentication protocols like NTLM, particularly when security measures like multi-factor authentication are absent. The discussion also addresses the dangers posed by application passwords in inter-application communication and the risks of exposure on the Internet.
Transcript
Play full episode