Today > | 1 Medium vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
Cyber threat actors, including nation-state groups, are utilizing legitimate cloud services like Microsoft OneDrive and Google Drive for covert operations. These services evade detection by masquerading as trusted entities, enabling data exfiltration and tool deployment. A new Go-based backdoor, Go…