URL has been copied successfully!
Mailbox Rule Abuse Emerges as Stealthy Post-Compromise Threat
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Mailbox Rule Abuse Emerges as Stealthy Post-Compromise Threat

Attackers are abusing Microsoft 365 mailbox rules to hide activity, exfiltrate data and retain access after account compromise, researchers warn

First seen on infosecurity-magazine.com

Jump to article: www.infosecurity-magazine.com/news/mailbox-rule-abuse-stealthy-post/

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link