Cyberespionage: Targeted Attacks Abusing Third-Party Cloud Services


Posted on in Presentations

The presentation will deal with abusing third-party cloud services in targeted attacks. Through multiple APT cases from around the world, presenters will show which cloud services were abused, why and how. For each case, they will discuss advantages and disadvantages of such abuse for malware developers, organisation defenders and threat researchers. Both Windows and Android malware cases will be included.

Participants
Jaromir Horejsi

Participant

Senior Cyber Threat Researcher, Trend Micro


Share With Your Community