The Office 365 “Trust Us” Model
Based on Office 365 proliferations and its Optimize category requirement; O365 may just be the next-best hacker playground. Imagine knowing that by exploiting one cloud location you may have a much lower bar (or none at all) accessing many corporations.
Martin Zinaich | 6/9/2019