Blog Post

Microsoft Security Experts Blog
15 MIN READ

Investigating malicious OAuth applications using the Unified Audit Log

matthewzorich's avatar
matthewzorich
Icon for Microsoft rankMicrosoft
Dec 15, 2023
Abstract Supply chain attacks continue to evolve in sophistication with new TTPs emerging every few months. In this article we highlight some of the most recently observed TTPs and our recommendati...
Updated Dec 13, 2023
Version 1.0