Blog Post

Microsoft Security Community Blog
3 MIN READ

Mitigating vulnerabilities with identity security posture assessments

Or Tsemah's avatar
Or Tsemah
Iron Contributor
Sep 03, 2020
Imagine the following scenario, after a successful phishing campaign, an attacker finds themselves with an active shell on one of your non-sensitive employee’s devices. Using Living-off-the-Land (Lot...
Updated May 11, 2021
Version 9.0