Hunting M365 Invaders: Blue Team's Guide to Initial Access Vectors | Splunk

https://www.splunk.com/en_us/blog/security/hunting-m365-invaders-blue-team-s-guide-to-initial-access-vectors.html