Attackers are abusing the characteristics of cloud services to launch and hide their activity as they traverse target networks. A new body of evidence indicates threat actors are using increasingly advanced techniques to target cloud providers and leveraging cloud-specific traits to hide their activity as they breach and persist in target networks.
Read full news article on Dark Reading: Cloud