Cybersecurity expert Erica shares her incredible journey from pharmacist to becoming a professional hacker. She reveals how attackers are bypassing modern security controls like MFA and what you can do to protect your tenant.
We talk about the most common configuration vulnerabilities that exist in almost every organization, the dangers of application onboarding, and the top five phishing vectors threat actors are using to gain initial access, including clever abuses of Microsoft Teams.
Subscribe with your favorite podcast player or watch on YouTube 👇
About Erica
Erica has an amazing career arc, starting in pharmacy before pivoting to cybersecurity. With a deep, hands-on understanding of offensive security gained from platforms like Hack the Box and real-world penetration testing, she specializes in protecting and defending Microsoft Cloud tenants. Erica is passionate about sharing her knowledge on how to better protect your tenant and what bad guys are looking for.
LinkedIn - https://www.linkedin.com/in/erica-z-b4169598/
🔗 Related Links
Hack The Box - https://www.hackthebox.com/
Altered Security - https://www.alteredsecurity.com/
📗 Chapters
00:00:00 Intro
00:02:14 From Pharmacy to Cybersecurity
00:07:19 Learning to Hack with Hack The Box
00:11:45 The First Cloud Hack: M365 Public Groups
00:17:50 The Hidden Dangers of App Onboarding
00:25:53 The 5 Modern Phishing Attack Vectors
00:30:36 Bypassing MFA with Device Code Phishing
00:34:34 Adversary-in-the-Middle & Auth Downgrade Attacks
00:48:24 The Secret to Mastering Cybersecurity Skills
Podcast Apps
🎙️ Entra.Chat - https://entra.chat
🎧 Apple Podcast → https://entra.chat/apple
📺 YouTube → https://entra.chat/youtube
📺 Spotify → https://entra.chat/spotify
🎧 Overcast → https://entra.chat/overcast
🎧 Pocketcast → https://entra.chat/pocketcast
🎧 Others → https://entra.chat/rss
Merill's socials
📺 YouTube → youtube.com/@merillx
👔 LinkedIn → linkedin.com/in/merill
🐤 Twitter → twitter.com/merill
🕺 TikTok → tiktok.com/@merillf
🦋 Bluesky → bsky.app/profile/merill.net
🐘 Mastodon → infosec.exchange/@merill
🧵 Threads → threads.net/@merillf
🤖 GitHub → github.com/merill