Research identifies how cyberattackers use Microsoft Office 365 tools

Sorry, this post has not been published yet, check again later!

October 14, 2020
Published by:


Vectra's 2020 Spotlight Report pinpoints the vulnerabilities in Microsoft Office 365, revealing that cyberattackers use built-in services to infiltrate and breach organizations.

Read publication

Most recent media coverage

Use AI to beat the bad guys

September 21, 2021


Read more

How Superloop Reduced False Positives with Behavioural Threat Detection

September 19, 2021

CSO Online

Read more

Half of On-Prem Databases Contain Security Vulnerabilities

September 15, 2021


Read more