Cyberespionage: Targeted Attacks Abusing Third-Party Cloud Services

Posted on in Presentations

The presentation will deal with abusing third-party cloud services in targeted attacks. Through multiple APT cases from around the world, presenters will show which cloud services were abused, why and how. For each case, they will discuss advantages and disadvantages of such abuse for malware developers, organisation defenders and threat researchers. Both Windows and Android malware cases will be included.

Jaromir Horejsi


Senior Cyber Threat Researcher, Trend Micro

Share With Your Community