fromSecurityWeek
1 day agoGoogle Disrupts Chinese Cyberespionage Campaign Targeting Telecoms, Governments
The attacker was using API calls to communicate with SaaS apps as command-and-control (C2) infrastructure to disguise their malicious traffic as benign, a common tactic used by threat actors when attempting to improve the stealth of their intrusions. Rather than abusing a weakness or security flaw, attackers rely on cloud-hosted products to function correctly and make their malicious traffic seem legitimate.
Information security

