Monthly Wrap
MONTHLY WRAP MONTHLY WRAP Overview February reinforced a consistent operational reality, which suggests attackers are gaining access and staying hidden by abusing trusted services and normal workflows more often than by relying on novel exploitation. This month featured stealthy “legitimate-functionality” tradecraft, including PRC-nexus abuse of the Google Sh