Proofpoint identifies Microsoft 365 functionality that opens new cloud-based attack vectors [TechSpot]

View Article on TechSpot

The exploit relies on a four-step attack chain that begins with a specific user’s identity being compromised. The malicious actor uses the individual’s credentials to access a user’s SharePoint or OneDrive accounts, change versioning settings, and then encrypts the files multiple times, leaving no unencrypted version of the compromised files….

Read Entire ArticleRead Comments