
The double-edged sword of cyber espionage. [Research Saturday]
CyberWire Daily
00:00
Defending Against Cyber Espionage in Cloud Accounts
This chapter emphasizes securing cloud accounts, limiting access to enterprise-owned accounts, monitoring connections for the graph API, and taking proactive measures to prevent unauthorized access. It also discusses how attackers exploit Microsoft services as legitimate users, challenges in identifying and blocking malicious users, and how organizations often discover their victimization through the presence of malware on their networks.
Play episode from 11:51
Transcript


