You've successfully subscribed to The CISO's Brief
Great! Next, complete checkout for full access to The CISO's Brief
Welcome back! You've successfully signed in.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info is updated.
Billing info update failed.

Office 365: a favorite for cyberattack persistence [42.3.2]

A study found that Office 365 is largely used for both initial access and lateral movement. These are the techniques and recommendations.

Analysts team