How Advanced Attackers Take Aim at Office 365

Researchers discuss how adversaries use components of Office 365 that are poorly understood and not closely monitored.
This post appeared first on Dark Reading
Author: Kelly Sheridan Staff Editor, Dark Reading