Mailbox Rule Abuse Emerges as Stealthy Post-Compromise Threat

Attackers are abusing Microsoft 365 mailbox rules to hide activity, exfiltrate data and retain access after account compromise, researchers warn

This article has been indexed from www.infosecurity-magazine.com

Read the original article: