Living off the Cloud
Modern persistence and command-and-control rarely look like classic malware anymore. We study how attackers live inside SaaS and identity:
- Abuse of OAuth apps, tokens, and delegated scopes
- M365 & Google Workspace persistence patterns
- Using benign automation (Flows, Apps Script, etc.) as infrastructure