Just as they did with PowerShell for Windows, threat actors are abusing native O365 capabilities for lateral movement, command-and-control communication, and other malicious activity.
from Dark Reading: https://ift.tt/2IyAEcA
via IFTTT
Just as they did with PowerShell for Windows, threat actors are abusing native O365 capabilities for lateral movement, command-and-control communication, and other malicious activity.
from Dark Reading: https://ift.tt/2IyAEcA
via IFTTT