Living off the Cloud: Modern Persistence in M365 & Workspace
How attackers maintain access in Microsoft 365 and Google Workspace without classic malware: OAuth consent, automation abuse, and identity misdesign—plus what to log and how to respond.
Research Notes are short-to-medium length writeups that sit between blog posts and formal papers. They encode adversary tradecraft and recommendations for real environments: cloud, SaaS, identity, detection, and IR.
Use dropdown or category pills to refine.
How attackers maintain access in Microsoft 365 and Google Workspace without classic malware: OAuth consent, automation abuse, and identity misdesign—plus what to log and how to respond.
A practical approach to building a minimal signal set that still catches meaningful attacks, with examples across identity logs, endpoint telemetry, and SaaS audit trails.
Lessons from running incident simulations where leadership, legal, and engineering all participate—what works, what fails, and how to design exercises that lead to concrete change.
Where identity architecture—not just MFA configuration—creates systemic risk, with examples in Entra ID and Workspace and concrete patterns for hardening.
How security narratives are often misaligned with actual exposure, and ways to present cloud, identity, and SaaS risk to leadership without hand-waving.
Why AI assistants integrated with M365, Google Workspace, and SaaS behave like power users with perfect memory—and what that means for access, logging, and incident response.