4
When Privileged Access Falls into the Wrong Hands: Chinese Companies in Microsoft’s MAPP Program
(nattothoughts.substack.com)
3
Attackers abusing Proofpoint & Intermedia link wrapping to deliver phishing payloads
(www.cloudflare.com)