hackers Exploit Google Drive, OneDrive to Hide Malicious Traffic

Threat actors are now using trusted cloud platforms to hide malicious traffic, according to security researchers at Insikt. This technique increases data theft efficiency and weakens existing security mechanisms. Experts recommend a multi-method approach to defense, involving network, file, log detection, proactive internet service assessment and attack simulations. They also suggest implementing TLS interception, flagging malicious LIS usage and deploying proactive threat-hunting techniques.