This resource is no longer available

Cover Image

APT29 and other threat actors have used several methodologies to move laterally from on-premises networks to the cloud, specifically Microsoft 365.

This white paper is designed to help organizations understand the attack techniques employed by APT29, how to proactively harden their environments against them, and how to remediate environments where similar techniques have been observed.

Download now to learn more.

Vendor:
Mandiant
Posted:
Mar 24, 2023
Published:
Mar 25, 2023
Format:
HTML
Type:
White Paper

This resource is no longer available.