Replies: 1 comment 1 reply
-
Microsoft Power Automate has "Desktop Flows", which is the bit I haven't explored yet, but is a form of Robotic Process Automation (RPA). I'm guessing a user probably needs some software installed for it already, but I'm wondering if someone already makes use of it and you compromise the Power Automate account, then possibly you could modify or create new flows that may allow an endpoint compromise? One to check out for sure. |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Consider attacks like:
Feels like these would be "Execution" phase attack techniques?
Are there any other we're aware of?
Beta Was this translation helpful? Give feedback.
All reactions