The study from network detection and response company Vectra , based on four million monitored Office 365 accounts, shows that 71 percent of of those surveyed had seen suspicious Office 365 Power Automate behaviors. In addition 56 percent of customers saw suspicious Office 365 eDiscovery behaviors and 96 percent had seen attempts at lateral movement. Within the new work from home paradigm, user account takeover in Office 365 is the most effective way for an attacker to move laterally inside an...

Read the full article at Betanews