ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Identity Control Plane Under Attack: Consent Abuse and Hybrid Sync Risks

Автор: Microsoft Security Community

Загружено: 2026-02-23

Просмотров: 655

Описание: Monday, Februray 23rd 2026 | 8:00AM – 9:00AM (PT, Redmond Time webinar recording date)

Microsoft Defender for Identity | Identity Control Plane Under Attack: Consent Abuse and Hybrid Sync Risks

Presenters: Dima Zinkevich, Nestori Syynimaa, Tal Guetta, and Luc van den Ende

Description:
A new wave of identity attacks abuses legitimate authentication flows, allowing attackers to gain access without stealing passwords or breaking MFA. In this session, we’ll break down how attackers trick users into approving malicious apps, how this leads to silent account takeover, and why traditional phishing defenses often miss it.

We’ll also dive into the identity sync layer at the heart of hybrid environments. You’ll learn how Entra Connect Sync and Cloud Sync are protected as Tier-0 assets, how Microsoft Defender for Identity secures synchronization flows, and how the new application-based authentication model strengthens Entra Connect Sync against modern threats.

Timestamps:
00:00 – Introduction
01:18 – OAuth2 rundown
08:40 – "ConsentFix" attack technicalities
14:45 – Detection methods
16:50 – ITDR detection (demo + example)
21:08 – Hybrid Sync Risk
35:45 – Identity attack paths
40:50 – Close

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Identity Control Plane Under Attack: Consent Abuse and Hybrid Sync Risks

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Defender for Identity in the Microsoft 365 Defender Portal: Tips and Tricks

Defender for Identity in the Microsoft 365 Defender Portal: Tips and Tricks

Agents That Actually Work: From an MVP

Agents That Actually Work: From an MVP

2025 Cybersecurity Symposium: Keynote Speaker Allyn Lynd - Security Theater vs. Security Outcomes

2025 Cybersecurity Symposium: Keynote Speaker Allyn Lynd - Security Theater vs. Security Outcomes

Secure access for the workforce in the AI era

Secure access for the workforce in the AI era

Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)

Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)

Seer 365 Sessions: Building Better Business Central Experiences Together

Seer 365 Sessions: Building Better Business Central Experiences Together

Circles - Area, Circumference, Radius & Diameter Explained!

Circles - Area, Circumference, Radius & Diameter Explained!

Cybersecurity Architecture: Who Are You? Identity and Access Management

Cybersecurity Architecture: Who Are You? Identity and Access Management

Algebra Basics: What Is Algebra? - Math Antics

Algebra Basics: What Is Algebra? - Math Antics

System Design Concepts Course and Interview Prep

System Design Concepts Course and Interview Prep

Как защитить API: Уязвимости и решения

Как защитить API: Уязвимости и решения

Build a unified access foundation

Build a unified access foundation

Cybersecurity Architecture: Networks

Cybersecurity Architecture: Networks

Cybersecurity Architecture: Endpoints Are the IT Front Door - Guard Them

Cybersecurity Architecture: Endpoints Are the IT Front Door - Guard Them

Security Copilot in Purview Technical Deep Dive

Security Copilot in Purview Technical Deep Dive

Microsoft Sentinel | Accelerate your SIEM migration to Microsoft Sentinel

Microsoft Sentinel | Accelerate your SIEM migration to Microsoft Sentinel

Calculus at a Fifth Grade Level

Calculus at a Fifth Grade Level

Mitigate threats using Microsoft Defender XDR SC-200 | Episode 1

Mitigate threats using Microsoft Defender XDR SC-200 | Episode 1

Cybersecurity Architecture: Application Security

Cybersecurity Architecture: Application Security

Introducing the UEBA Behaviors Layer in Microsoft Sentinel

Introducing the UEBA Behaviors Layer in Microsoft Sentinel

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]