...
Expand | ||
---|---|---|
| ||
A government-backed attacker could try to steal a password or other personal information of one of your users by sending an email containing a harmful attachment, links to malicious software or to fake websites. Source table → |
Expand | ||
---|---|---|
| ||
An attacker may access data objects from improperly secured cloud storage. Source table → |
Expand | ||
---|---|---|
| ||
A Google Access Transparency log event has been generated. Google is accessing your data. Source table → |
Expand | ||
---|---|---|
| ||
An adversary may attempt to disable the second factor authentication in order to weaken an organization’s security controls. Source table → |
Expand | ||
---|---|---|
| ||
An attacker could steal the credentials of one of your users. Source table → |
Expand | ||
---|---|---|
| ||
An attacker could steal the credentials or the mobile device of one of your users. Source table → |
Expand | ||
---|---|---|
| ||
An adversary may steal application access tokens as a means of acquiring credentials to access remote systems and resources. Source table → |
Expand | ||
---|---|---|
| ||
Detects authentications from OAuth apps outside of your predefined list of approved OAuth applications. Source table → |