Recently in the SOC, we were notified by a partner that they had a potential business email compromise, or BEC. We commonly catch these by identifying suspicious email forwarding rules, […]

The post Monitoring High Risk Azure Logins  appeared first on Black Hills Information Security.

Article Link: Monitoring High Risk Azure Logins  – Black Hills Information Security

1 post – 1 participant

Read full topic

​Recently in the SOC, we were notified by a partner that they had a potential business email compromise, or BEC. We commonly catch these by identifying suspicious email forwarding rules,
The post Monitoring High Risk Azure Logins  appeared first on Black Hills Information Security.
Article Link: Monitoring High Risk Azure Logins  – Black Hills Information Security
1 post – 1 participant
Read full topic