Ebook

Cloud in the Crosshairs: How Cyber Criminals Exploit File-Sharing, Identity and Supply Chain Vulnerabilities in Microsoft 365

Cloud in the Crosshairs: How Cyber Criminals Exploit File-Sharing, Identity and Supply Chain Vulnerabilities in Microsoft 365

Focusing on Microsoft 365, this e-book reveals how attackers bypass native controls through people-centric attacks. Proofpoint identifies five main threats: business email compromise, telephone-oriented attack delivery (TOAD), weaponized file sharing, account takeover, and compromised supplier accounts. Real-world examples include payroll redirects, CEO impersonations, malicious file-sharing links, and credential phishing hosted on trusted platforms like OneDrive and SendGrid. It highlights the rise of TOAD scams, which rely on phone-based manipulation, and massive abuse of file-sharing services to host malicious content. The analysis underscores why third-party security is critical to counter evolving cloud threats.

Join for free to read