The Cyber Threat Perspective cover image

Episode 98: Current State of M365 Attacks: Initial Access

The Cyber Threat Perspective

00:00

Vulnerabilities of Legacy Authentication Protocols

This chapter highlights the vulnerabilities linked to outdated authentication protocols like NTLM, particularly when security measures like multi-factor authentication are absent. The discussion also addresses the dangers posed by application passwords in inter-application communication and the risks of exposure on the Internet.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app