Threat Advisories:
Highlights of Our CISO Dinner
Upgrading struggling vulnerability management programs to Threat Exposure Management, with Host, CISO Al Lindseth formerly from Plains All American Pipeline and PWC - 6 minute podcast
0:00
0:00
👥 Play Count: Loading...

Cloud Services Transformed into Cyber Weapons: New Wave of Espionage

Amber | Attack Report
Download PDF

Cybercriminals are increasingly leveraging legitimate cloud services like Microsoft OneDrive and Google Drive in their attacks, creating discreet and cost-effective infrastructures that evade detection. Recent campaigns have highlighted this trend, with malware such as GoGra, Grager, and MoonTag being deployed against organizations. This growing trend underscores the need for heightened scrutiny of cloud service traffic as cyber espionage groups continue to exploit these trusted platforms for malicious activities.

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox