Posted on
in Presentations
Over the past year, we observed a sharp increase in the abuse of social media, SaaS, and cloud hosting platforms in various stages of the attack chain by APT groups. This method of abuse enables threat actors to hide among legitimate network traffic while stealthily executing an attack chain. Nation-state threat actors have recently carried out attacks utilizing these tactics and techniques.
Share With Your Community