cerrar
cerrar
Su red del mañana
Su red del mañana
Planifique su camino hacia una red más rápida, más segura y más resistente diseñada para las aplicaciones y los usuarios a los que da soporte.
          Descubra Netskope
          Get Hands-on With the Netskope Platform
          Here's your chance to experience the Netskope One single-cloud platform first-hand. Sign up for self-paced, hands-on labs, join us for monthly live product demos, take a free test drive of Netskope Private Access, or join us for a live, instructor-led workshops.
            Líder en SSE. Ahora es líder en SASE de un solo proveedor.
            Líder en SSE. Ahora es líder en SASE de un solo proveedor.
            Netskope debuta como Líder en el Cuadrante Mágico™ de Gartner® para Single-Vendor SASE
              Protección de la IA generativa para principiantes
              Protección de la IA generativa para principiantes
              Learn how your organization can balance the innovative potential of generative AI with robust data security practices.
                Modern data loss prevention (DLP) for Dummies eBook
                Prevención moderna de pérdida de datos (DLP) para Dummies
                Get tips and tricks for transitioning to a cloud-delivered DLP.
                  Libro SD-WAN moderno para principiantes de SASE
                  Modern SD-WAN for SASE Dummies
                  Deje de ponerse al día con su arquitectura de red
                    Entendiendo dónde está el riesgo
                    Advanced Analytics transforms the way security operations teams apply data-driven insights to implement better policies. With Advanced Analytics, you can identify trends, zero in on areas of concern and use the data to take action.
                        Los 6 casos de uso más convincentes para el reemplazo completo de VPN heredada
                        Los 6 casos de uso más convincentes para el reemplazo completo de VPN heredada
                        Netskope One Private Access is the only solution that allows you to retire your VPN for good.
                          Colgate-Palmolive Salvaguarda su "Propiedad Intelectual" con Protección de Datos Inteligente y Adaptable
                          Colgate-Palmolive Salvaguarda su "Propiedad Intelectual" con Protección de Datos Inteligente y Adaptable
                            Netskope GovCloud
                            Netskope logra la alta autorización FedRAMP
                            Elija Netskope GovCloud para acelerar la transformación de su agencia.
                              Let's Do Great Things Together
                              La estrategia de venta centrada en el partner de Netskope permite a nuestros canales maximizar su expansión y rentabilidad y, al mismo tiempo, transformar la seguridad de su empresa.
                                Soluciones Netskope
                                Netskope Cloud Exchange
                                Netskope Cloud Exchange (CE) provides customers with powerful integration tools to leverage investments across their security posture.
                                  Soporte técnico Netskope
                                  Soporte técnico Netskope
                                  Nuestros ingenieros de soporte cualificados ubicados en todo el mundo y con distintos ámbitos de conocimiento sobre seguridad en la nube, redes, virtualización, entrega de contenidos y desarrollo de software, garantizan una asistencia técnica de calidad en todo momento
                                    Vídeo de Netskope
                                    Netskope Training
                                    La formación de Netskope le ayudará a convertirse en un experto en seguridad en la nube. Estamos aquí para ayudarle a proteger su proceso de transformación digital y aprovechar al máximo sus aplicaciones cloud, web y privadas.

                                      Mitigating the Latest Microsoft Teams Vulnerability with Netskope

                                      Jul 24 2023

                                      Recently, a team of experts from JumpSEC Labs discovered a vulnerability in Microsoft Teams that allows malicious actors to bypass policy controls and introduce malware through external communication channels. Leaving end-users susceptible to phishing attacks. 

                                      Microsoft’s advice is to educate end-users to detect phishing attempts. One workaround would be to disable Microsoft Teams collaboration with external organizations.

                                      This particular vulnerability in Microsoft Teams enables threat actors to bypass existing policy controls, allowing them to share links to malicious files within Teams chats, without the end-user ever accepting a message-request. This circumvention of security measures can have severe consequences for organizations, especially considering that Microsoft Teams boasts a user base of 300 million users worldwide.

                                      To make matters worse, this attack does not rely on email, bypassing traditional email security measures and abusing the inherent trust end-users have with collaboration tools. Besides end-users, many organizations inherently trust SaaS as a reliable source as well. This translates to security controls where trusted sources are not inspected and thus bypassed.

                                      The Netskope Threat Labs Stats for June 2023 blog revealed that 60% of all malware downloads through HTTP/HTTPS were traced back to popular cloud apps. Additionally, 32% of SaaS-delivered malware originated from OneDrive and SharePoint, indicating the need for strengthened security measures on these platforms. The notion that SaaS is considered a ”trusted source” directly contradicts the fundamental principle of zero trust.

                                      Based on these principles, organizations should always inspect all downloads for threats, regardless of their origin. This approach allows organizations to enable external parties to share content while still leveraging Netskope Advanced Threat Protection to block malicious file transfers.

                                      To effectively combat such threats, organizations need a comprehensive cybersecurity solution that follows the principles of zero trust and secure access service edge (SASE). Netskope implements these principles through its private cloud platform regardless of an organization’s location or the nature of their workloads (Web, SaaS, VPC, IaaS, etc.), protecting users and machines across various environments.

                                      The power Netskope provides is the ability to identify and control the usage of specific SaaS instances within a service. This granular control empowers organizations to mitigate and manage risks effectively while enabling collaboration across multiple SaaS platforms. By implementing Netskope, organizations can protect users from interacting with unknown and unmanaged SaaS applications, including those originating from desktop clients like Microsoft Teams. Additionally, Netskope allows organizations to enforce limitations on SaaS activities, such as sharing, liking, reposting, and downloading files, especially when they involve trusted external partners.

                                      These capabilities make it possible to protect end-users against these phishing attacks as shown in the diagram below.

                                      MS Teams Abuse

                                      Additionally, to enable these security measures, Netskope leverages advanced threat protection techniques such as sandboxing and data protection. These features allow for the scanning of sensitive information, such as personally identifiable information (PII), source code, or medical records, to identify potential threats or policy violations. By combining these advanced measures with the robust Netskope security platform, organizations can effectively defend against emerging threats.

                                      Netskope’s Advanced Analytics capabilities provide security teams with specific dashboards and valuable insights to assess the risk of rogue cloud instances being exploited for malware delivery or the potential of anomalous communications targeting the organization. Rich details and comprehensive analysis empower security teams to make informed decisions and streamline the mitigation and remediation processes. The Sankey diagram below showcases a visual representation of the interaction between various SaaS, the used instances, and their respective activities.

                                      Netskope Advanced Analytics Dashboard to assess the risk of rogue cloud instances

                                      The Microsoft Teams vulnerability discussed in this blog highlights the importance of comprehensive visibility, understanding, and control of SaaS, the instances, and the activities within.

                                      By leveraging the comprehensive security solutions offered by Netskope, organizations can effectively protect themselves from emerging threats and vulnerabilities by applying zero trust, advanced threat protection and robust data security measures.

                                      To learn more on how Netskope can help your organization to mitigate similar risks via instance awareness, watch this demo: Defending against cloud threats with instance-awareness. Additionally, to learn more about the latest emergent cloud-native threats, and how Netskope can mitigate them, subscribe to the Cloud Threats Memos so you don’t miss a threat!

                                      author image
                                      Mitchell Pompe
                                      Mitchell is a cloud security professional in the Netherlands, with 10 years of experience in networking and a master's degree in cybersecurity engineering.
                                      Mitchell is a cloud security professional in the Netherlands, with 10 years of experience in networking and a master's degree in cybersecurity engineering.

                                      ¡Mantente informado!

                                      Suscríbase para recibir lo último del blog de Netskope