Download pdf
This presentation will cover how and why APT actors are leveraging the Microsoft Exchange environments of victim organizations to conduct cyberespionage operations. Key areas of focus are how attackers are leveraging Microsoft Exchange to exfiltrate data and maintain access to an organization’s network and employee emails. Each attacker technique will then be coupled with a method of detection.