This blog post was co-authored by Tal Maor, Microsoft Security researcher
Exploited accounts can be used for several malicious purposes including reading email in a user’s inbox, creating rules...
Updated Nov 02, 2021
Version 8.0Niv Goldenberg
Iron Contributor
Joined January 29, 2017
Microsoft Security Community Blog
Follow this blog board to get notified when there's new activity