Nation-state espionage operations are increasingly using native Microsoft services to host their command-and-control (C2) needs. A number of unrelated groups in recent years have all come to the same ...
In Part 1, I explained what Microsoft Graph is and what it is used for. Near the end, I explained that before an application can take advantage of Graph, it will generally have to be registered. In ...