Research May 12 11 min read Undermining the trust boundary: Investigating a stealthy intrusion through third-party compromise By Microsoft Incident Response
Undermining the trust boundary: Investigating a stealthy intrusion through third-party compromise
Classification
SEV 1/10
Research May 12 11 min read Undermining the trust boundary: Investigating a stealthy intrusion through third-party compromise By Microsoft Incident Response
CONFIDENCE37%
Categories
Threat Actors
Target Sectors
Extracted Entities (0)
No threat entities extracted.
ID: 457Lang: enType: article