Session

I Stole Your Azure Tenant With a Login Link

How OAuth, B2B, and Microsoft Graph turn trust into an attack surface

Modern cloud breaches no longer begin with exploits or malware. They begin with a link.

In this live demo, we show how a typical Microsoft Entra and Azure environment can be compromised using nothing more than B2B guest access and a standard “Sign in with Microsoft” OAuth flow. One click is all it takes to create a persistent, API-level foothold inside a tenant, one that survives password resets, bypasses MFA, and quietly expands over time.

This is how modern empires fall. No malware. No zero-days. Just 1999-era trust bugs, cookies, redirects, and pop-ups that were never designed to guard trillion-dollar clouds.

Attendees will leave with a clear understanding of how these attacks actually happen today and what concrete controls and practical defenses stop them.

Eric Boyd

Founder & CEO, responsiveX, Azure & AI MVP, Microsoft RD

Chicago, Illinois, United States

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top