Perimeter defense is a lie. In this mission briefing, we walk through a real-world style Microsoft 365 breach where attackers use consent phishing, AiTM token theft, and OAuth abuse to
Perimeter defense is a lie. In this mission briefing, we walk through a real-world style Microsoft 365 breach where attackers use consent phishing, AiTM token theft, and OAuth abuse to
100:00:00,000 –> 00:00:03,520Your SharePoint isn’t messy, it’s a landfill, and you built it. 200:00:03,520 –> 00:00:04,760The truth? 300:00:04,760 –> 00:00:07,560Most of your collaboration spaces are mausoleums. 400:00:07,560 –> 00:00:10,320Dead projects,
100:00:00,000 –> 00:00:02,560Your Power Automate emails aren’t clever automations. 200:00:02,560 –> 00:00:04,440They’re an HR breach waiting to happen. 300:00:04,440 –> 00:00:06,280You glue the flow to a service account, 400:00:06,280 –>
This episode is a drill for security leaders, identity admins, and anyone running Microsoft 365 / Entra (Azure AD). We walk through how attackers weaponize OAuth consent—not password theft—to gain
100:00:00,000 –> 00:00:03,680Dear congregation, we scatter reports like leaves in a high wind, 200:00:03,680 –> 00:00:06,440and then we wonder why no one can find the tree. 300:00:06,440 –> 00:00:08,640Most think