Material Security’s Post

View organization page for Material Security, graphic

6,069 followers

The Midnight Blizzard attack against Microsoft continues to send shockwaves across the industry. In their latest update, 6 months after the initial disclosure, Microsoft warns that the attackers who compromised employee email accounts also gained access to select customer email accounts. We continue to see email breach scenarios go undetected and uncontained for long periods of time. Protecting email as a “way in” remains a top priority, but what happens “once in”? An attacker’s ability to live off the land via a compromised email account has dangerous and lasting consequences. This ongoing incident is another reminder to consider the email attack surface from all angles, and apply protections to accounts that have access to sensitive data, systems, and apps. https://lnkd.in/e3-S_QRR

Microsoft informs customers that Russian hackers spied on emails

Microsoft informs customers that Russian hackers spied on emails

reuters.com

Kevin Bayly

VP of Sales @ Material

1w

Glaringly obvious that #security teams need an additional layer as an insurance policy against their own MSFT cloud office environment. Trusting MSFT to secure MSFT has led us to this point.

Like
Reply

To view or add a comment, sign in

Explore topics