Channel | Publish Date | Thumbnail & View Count | Actions |
---|---|---|---|
| 2025-02-13 09:36:23 | ![]() 214 Views |
They’ll deploy GraphRunner (created by Beau Bullock), a post-exploitation toolset for interacting with the Microsoft Graph API and demonstrate how it enables attackers to easily steal authentication tokens without triggering typical security defenses.
Key Topics Covered:
What is Device-Based Phishing?
Understanding the Microsoft Device Registration Exploit
How GraphRunner is used in device-based phishing
Real-World Application of Device Authentication Attacks
Mitigation Strategies for MSPs and Defenders
If you’re in the security space or just interested in understanding the mechanics behind advanced phishing techniques, this episode is a must-watch.
Like and Subscribe to stay up to date on our latest episodes. Remember, we’re live on YouTube every Wednesday at 2 PM MT.
⎯⎯⎯⎯⎯⎯⎯⎯
CONNECT WITH THE HOSTS
Matt Lee | CISSP | CCSP | PNPT | Security & Compliance – Senior Director | Pax8
LinkedIn: cybermattlee
YouTube: youtube/cybermattlee
Website: cybermattlee.com
Dominic Kirby | SSCP | Sr. Director of Professional Services | Pax8
LinkedIn: /in/dominickirby
YouTube: youtube/DomKirby
Website: domkirby.com
⎯⎯⎯⎯⎯⎯⎯⎯
LINKS
Learn More About Pax8
Why Pax8? – http://pax8.io/gmg150PJmU1
Explore our cloud marketplace – http://pax8.io/3Xl650PJmUV
Sign Up for Beyond Denver 2025
Join us June 8th-10th, 2025 – https://www.pax8beyond.com/
Sign Up for Beyond EMEA 2025
Join us October 5-7th, 2025 https://www.pax8beyond.com/emea/pax8beyond-emea-agenda/
Subscribe To Our Channel
Never miss an episode of The Game – http://pax8.io/5yxJ50JJ3Z3
Follow Us
LinkedIn – http://pax8.io/1jFu50JJ423
Twitter – http://pax8.io/AAth50JJ42u
Facebook – http://pax8.io/A4gR50JJ43f
Shop Pax8 Club
See our collection of softwear – http://pax8.io/3Cwp50PJmVl
Please take the opportunity to connect and share this video with your friends and family if you find it useful.