100:00:00,000 –> 00:00:03,040Officers stand by for mission briefing, red alert. 200:00:03,040 –> 00:00:05,880MFA isn’t a shield on my watch. 300:00:05,880 –> 00:00:10,960Stolen tokens, right past it, like cloaked ships through
100:00:00,000 –> 00:00:03,040Officers stand by for mission briefing, red alert. 200:00:03,040 –> 00:00:05,880MFA isn’t a shield on my watch. 300:00:05,880 –> 00:00:10,960Stolen tokens, right past it, like cloaked ships through
Perimeter defense is a lie. In this mission briefing, we walk through a real-world style Microsoft 365 breach where attackers use consent phishing, AiTM token theft, and OAuth abuse to
100:00:00,000 –> 00:00:03,520Your SharePoint isn’t messy, it’s a landfill, and you built it. 200:00:03,520 –> 00:00:04,760The truth? 300:00:04,760 –> 00:00:07,560Most of your collaboration spaces are mausoleums. 400:00:07,560 –> 00:00:10,320Dead projects,
100:00:00,000 –> 00:00:02,560Your Power Automate emails aren’t clever automations. 200:00:02,560 –> 00:00:04,440They’re an HR breach waiting to happen. 300:00:04,440 –> 00:00:06,280You glue the flow to a service account, 400:00:06,280 –>
This episode is a drill for security leaders, identity admins, and anyone running Microsoft 365 / Entra (Azure AD). We walk through how attackers weaponize OAuth consent—not password theft—to gain






