Cyberespionage: Targeted Attacks Abusing Third-Party Cloud Services


Posted on in Presentations

The presentation will deal with abusing third-party cloud services in targeted attacks. Through multiple APT cases from around the world, presenters will show which cloud services were abused, why and how. For each case, they will discuss advantages and disadvantages of such abuse for malware developers, organisation defenders and threat researchers. Both Windows and Android malware cases will be included.


Participants
Jaromir Horejsi

Senior Cyber Threat Researcher, Trend Micro

Cloud Security & Virtualization Hackers & Threats

cloud security


Topic

Subtopic


Share With Your Community