Cloud in the crosshairs
How cyber criminals exploit file-sharing, identity, and supply chain vulnerabilities in Microsoft 365
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
The way we work has dramatically changed. The World Wide Web, social media, and newer technology like cloud computing allow teams to collaborate and get more work. Products such as Microsoft Office 365 provide tools that facilitate this new way of working.
They transform businesses into productive powerhouses.
Unfortunately, these are popular targets for cyber criminals who want to exploit unsuspecting organisations. This report explores five people-centric attacks that attackers use to compromise target companies.
These attacks include:
- Business email compromise
- Telephone-oriented attack delivery
- Weaponized file sharing
- Account takeover
- Compromised supplier accounts
Download now
Provided by Proofpoint
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Tycoon 2FA is down, but not out – researchers warn the phishing as a service operation is still a huge threat to businessesNews Millions of Tycoon 2FA attacks are still hitting businesses, according to research from Barracuda
-
Security leaders overconfident about ransomware recoveryNews Few manage to recover all their data, and many experience business disruption
-
Zephyr Energy hackers swiped £700,000 after redirecting a contractor paymentNews Payment to a Zephyr Energy contractor was siphoned off, but the incident has been contained and new security measures implemented
-
Email Security at an Inflection Point: The 2026 Strategy Reportwhitepaper
-
The Network Penetration Testing Buyer’s Guidewhitepaper
-
Top 10 Critical Pentest Findings Report for 2025whitepaper
-
German authorities want your help finding the hackers behind GandCrab and REvilNews Daniil Maksimovich Shchukin and Anatoly Sergeevitsch Kravchuk are believed to have made millions from ransomware as a service schemes
-
'AI-generated phishing became the baseline' for hackers last year – Kaseya warns it's going to get worse in 2026News Forget looking for typos and bad grammar, phishing campaigns are using AI to boost their attack success


