Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

SaaS RootKit Exploits Hidden Rules in Microsoft 365

26 January 2023

A vulnerability within Microsoft’s OAuth application registration allows an attacker to create hidden forwarding rules that act as a malicious SaaS rootkit.

Read full article on Dark Reading: Cloud

 

Categories NEWS Tags Hidden, Microsoft 365, Rules, Security Pro, Vulnerability

Recent News

  • Biden Administration addresses potential commercial spyware risks31 March 2023
  • Elastic expands its cloud security capabilities for AWS31 March 2023
  • Detecting and Responding to Trojanized 3CX Desktop Applications31 March 2023
  • TikTok: why the app with 1bn users faces a fight for its existence31 March 2023
  • Cyber Police of Ukraine Busted Phishing Gang Responsible for $4.33 Million Scam31 March 2023
Copyright © 2023 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.