APT28 expands cyber ops with cloud C2 tactics
According to researchers at Sekoia.io, the operation has been active since late 2024 and involves attackers impersonating trusted contacts to share malicious Office documents disguised as administrative forms.SCM feed for Endpoint/Device SecurityRead More