100:00:00,000 –> 00:00:02,560Your Power Automate emails aren’t clever automations. 200:00:02,560 –> 00:00:04,440They’re an HR breach waiting to happen. 300:00:04,440 –> 00:00:06,280You glue the flow to a service account, 400:00:06,280 –>
100:00:00,000 –> 00:00:02,560Your Power Automate emails aren’t clever automations. 200:00:02,560 –> 00:00:04,440They’re an HR breach waiting to happen. 300:00:04,440 –> 00:00:06,280You glue the flow to a service account, 400:00:06,280 –>
This episode is a drill for security leaders, identity admins, and anyone running Microsoft 365 / Entra (Azure AD). We walk through how attackers weaponize OAuth consent—not password theft—to gain
100:00:00,000 –> 00:00:03,680Dear congregation, we scatter reports like leaves in a high wind, 200:00:03,680 –> 00:00:06,440and then we wonder why no one can find the tree. 300:00:06,440 –> 00:00:08,640Most think
Dear congregation, we scatter reports like leaves in a high wind. And then we wonder why no one can find the tree. Most think a quick share link is harmless.
100:00:00,000 –> 00:00:03,480You trained users on co-pilot and your ticket queue got longer. 200:00:03,480 –> 00:00:06,560Fascinating, you gave them decks, office hours, even a Q&A. 300:00:06,560 –> 00:00:10,480They left smarter






