"CISA Insights on APT Compromise of Microsoft 365 Via Password Exploits"

The U.S. Homeland Security Department's Cybersecurity & Infrastructure Security Agency (CISA) issued an alert about the use of compromised Microsoft 365 and Azure applications by the Advanced Persistent Threat (APT) actors behind the SolarWinds supply chain cyberattack to access cloud resources. CISA is investigating incidents in which the threat actors' may have gained initial access into victims' networks using techniques such as password guessing, password spraying, or the exploitation of improperly secured administrative credentials, rather than compromised SolarWinds Orion products. This article continues to discuss the latest alert released by CISA warning of the use of compromised Microsoft 365 and Azure applications by the SolarWinds APT attackers to gain access to cloud resources, as well as how organizations can defend themselves against the latest attacks detailed by Microsoft and CISA. 

HealthITSecurity reports "CISA Insights on APT Compromise of Microsoft 365 Via Password Exploits"

Submitted by Anonymous on