Recently in the SOC, we were notified by a partner that they had a potential business email compromise, or BEC. We commonly catch these by identifying suspicious email forwarding rules, […]
The post Monitoring High Risk Azure Logins appeared first on Black Hills Information Security.
Article Link: Monitoring High Risk Azure Logins – Black Hills Information Security
1 post – 1 participant
Recently in the SOC, we were notified by a partner that they had a potential business email compromise, or BEC. We commonly catch these by identifying suspicious email forwarding rules,
The post Monitoring High Risk Azure Logins appeared first on Black Hills Information Security.
Article Link: Monitoring High Risk Azure Logins – Black Hills Information Security
1 post – 1 participant
Read full topic