This is a great read. Thank you for sharing. Hopefully our company can start using these features to protect against breaches now that we are using Office 365...
This is a great read. Thank you for sharing. Hopefully our company can start using these features to protect against breaches now that we are using Office 365...
I'm curious how in that small anonymous video the information he gave that led to the breakthrough was the "Activities" API. Did this keyword allow researches to trawl the net till they found the...
I'm curious how in that small anonymous video the information he gave that led to the breakthrough was the "Activities" API. Did this keyword allow researches to trawl the net till they found the code related to the keyword, or did they probe the software looking for "Activities"?
Very good read. I need to dive deeper into our 365 subscription and other related things.
As mentioned in the HackerNews thread: https://news.ycombinator.com/item?id=17411689 crowdstrike already has (and long has) some code samples: https://github.com/CrowdStrike/Forensics/tree/master/O365-Outlook-Activities
This is a great read. Thank you for sharing. Hopefully our company can start using these features to protect against breaches now that we are using Office 365...
I'm curious how in that small anonymous video the information he gave that led to the breakthrough was the "Activities" API. Did this keyword allow researches to trawl the net till they found the code related to the keyword, or did they probe the software looking for "Activities"?
Yea that has me scratching my head. Such a 'coincidence' huh