APT29 and other threat actors have used several methodologies to move laterally from on-premises networks to the cloud, specifically Microsoft 365. This report will help organizations understand these techniques used by APT29, how to proactively harden their environments, and how to remediate environments where similar techniques have been observed.
Download this report and learn how to detect and remediate these attack techniques:
- Golden SAML Attack
- Abuse Azure AD Privileged Roles
- Hijack Azure AD Applications