Research identifies how cyberattackers use Microsoft Office 365 tools

Sorry, this post has not been published yet, check again later!

October 14, 2020
Published by:

Voxy

Vectra's 2020 Spotlight Report pinpoints the vulnerabilities in Microsoft Office 365, revealing that cyberattackers use built-in services to infiltrate and breach organizations.

Read publication

Most recent media coverage

Cyber Conflict Overshadowed a Major Government Ransomware Alert

April 26, 2022

Dark Reading

Read more

Latest T-Mobile Data Breach Has Some Wondering ‘How Lapsus$ Got Access in the First Place’

April 22, 2022

Channel Futures

Read more

Vectra Research Exposes Cybersecurity Health Crisis

April 7, 2022

Intelligent CISO

Read more