{"id":35191,"date":"2020-05-27T04:01:00","date_gmt":"2020-05-27T04:01:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks\/"},"modified":"2020-05-27T04:01:00","modified_gmt":"2020-05-27T04:01:00","slug":"use-of-cloud-collaboration-tools-surges-and-so-do-attacks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks\/","title":{"rendered":"Use of cloud collaboration tools surges and so do attacks"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2019\/10\/cso_nw_cloud_security_threats_lightning_strikes_a_digital_landscape_via_binary_clouds_by_robertiez_gettyimages-948430634-100813542-large.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>The COVID-19 pandemic has pushed companies to adapt to new government-mandated restrictions on workforce movement around the world. The immediate response has been rapid adoption and integration of cloud services, particularly cloud-based collaboration tools such Microsoft Office 365, Slack and videoconferencing platforms. <a href=\"https:\/\/www.mcafee.com\/blogs\/enterprise\/cloud-security\/working-from-home-in-2020-how-cloud-use-changed\/\" rel=\"noopener nofollow noreferrer\" target=\"_blank\">A new report<\/a> by security firm McAfee shows that hackers are responding to this with increased focus on abusing cloud account credentials.<\/p>\n<aside class=\"fakesidebar\">\n<p>[ Follow these <a href=\"https:\/\/www.csoonline.com\/article\/3303580\/cloud-security\/5-tips-for-better-cloud-security.html\">5 tips for better cloud security<\/a>. | Get the latest from CSO by <a href=\"http:\/\/www.csoonline.com\/newsletters\/signup.html\">signing up for our newsletters<\/a>. ]<\/p>\n<\/aside>\n<p>After analyzing cloud usage data that was collected between January and April from over 30 million enterprise users of its MVISION Cloud security monitoring platform, the company estimates a 50% growth in the adoption of cloud services across all industries. Some industries, however, saw a much bigger spike&#8211;for example manufacturing with 144% and education with 114%.<\/p>\n<p>The use rate of certain collaboration and videoconferencing tools has been particularly high. Cisco Webex usage has increased by 600%, Zoom by 350%, Microsoft Teams by 300% and Slack by 200%. Again, manufacturing and education ranked at the top.<\/p>\n<p>While this rise in the adoption of cloud services is understandable and, some would argue, a good thing for productivity in light of the forced work-from-home situation, it has also introduced security risks. McAfee&#8217;s data shows that traffic from unmanaged devices to enterprise cloud accounts doubled.<\/p>\n<p>&#8220;There&#8217;s no way to recover sensitive data from an unmanaged device, so this increased access could result in data loss events if security teams aren&#8217;t controlling cloud access by device type.&#8221;<\/p>\n<h2>Cloud threats increased<\/h2>\n<p>Attackers have taken notice of this rapid adoption of cloud services and are trying to exploit the situation. According to McAfee, the number of external threats targeting cloud services increased by 630% over the same period, with the greatest concentration on collaboration platforms.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id><\/aside>\n<p>For its report, the company split suspicious login attempts and access into two categories: excessive usage from anomalous location and suspicious superhuman. Both have seen a similar surge and growth pattern over the time period analyzed.<\/p>\n<p><strong>Excessive usage from anomalous location.<\/strong> This category is for successful logins from locations that are unusual given the organization&#8217;s profile, followed by the user accessing large quantities of data or performing a high number of privileged tasks.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id><\/aside>\n<p><strong>Suspicious superhuman.<\/strong> This category is for logins by the same user from two geographically distant locations over a short period of time &#8212; for example, if the same user logs into one service from one country and then minutes later access a service while using an IP address from a different country.<\/p>\n<p>The transportation and logistics, education and government institutions have seen the largest increases of threat events detected in their cloud accounts. For transportation and logistics, the rise in threats was as high as 1,350%, followed by education with 1,114%, government with 773%, manufacturing with 679%, financial services with 571% and energy with 472%.<\/p>\n<p>The top ten sources for external attacks against enterprise cloud accounts by IP address location have been Thailand, USA, China, India, Brazil, Russia, Laos, Mexico, New Caledonia and Vietnam.<\/p>\n<p>&#8220;Many of these attacks are likely opportunistic, essentially &#8216;spraying&#8217; cloud accounts with access attempts using stolen credentials,&#8221; the McAfee researchers said. &#8220;However, several prominent industries are often targeted by external threat actors&#8211;in particular, financial services. These targeted attacks are often found to have a source in either China, Iran or Russia.&#8221;<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id><\/aside>\n<h2>Credential stuffing attacks on the rise<\/h2>\n<p>The frequency of credential stuffing attacks, where criminals use lists of leaked or stolen username and password combinations to gain access to accounts, has grown significantly in recent years. Often the used credentials come from third-party data breaches and the attackers attempt to exploit the bad but still common practice of password reuse.<\/p>\n<p>In <a href=\"https:\/\/www.csoonline.com\/article\/3527858\/apis-are-becoming-a-major-target-for-credential-stuffing-attacks.html\" rel=\"noopener noreferrer\" target=\"_blank\">a report<\/a> released this year, security and content delivery company Akamai revealed that it observed 85.4 billion credential abuse attacks against organizations worldwide between December 2017 and November 2019. Of those, 473 million attacks targeted the financial sector.<\/p>\n<p>To better protect their employees&#8217; cloud accounts and prevent unauthorized access, McAfee recommends that companies <a href=\"https:\/\/www.csoonline.com\/article\/3533353\/covid-19-offers-a-unique-opportunity-to-pilot-zero-trust-rapidly-and-at-scale.html\" rel=\"noopener noreferrer\" target=\"_blank\">implement a cloud-based secure gateway<\/a> so employees don&#8217;t need to route their traffic through a VPN or use a <a href=\"https:\/\/www.csoonline.com\/article\/3104981\/what-is-a-cloud-access-security-broker-and-why-do-i-need-one.html\">cloud access security broker<\/a> platform with strict policies for device checks and data controls. If employees need to use their personal devices to access corporate SaaS applications, conditional access should be placed on sensitive data.<\/p>\n<aside class=\"fakesidebar\">\n<p><strong>More on cloud security:<\/strong><\/p>\n<\/aside>\n<div class=\"end-note\">\n<div id class=\"blx blxParticleendnote blxM2004 blox4_html blxC51120\">\n<aside><strong>Next read this<\/strong><br \/>\n<\/aside>\n<\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/www.csoonline.com\/article\/3545775\/use-of-cloud-collaboration-tools-surges-and-so-do-the-attacks-report-shows.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Some industries have seen increases in cloud-related threat events rise as much as 1,350% since the COVID-19 crisis began. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":35192,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[536,8513,1320,307],"class_list":["post-35191","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-cloud-security","tag-collaboration","tag-cyber-attacks","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Use of cloud collaboration tools surges and so do attacks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Use of cloud collaboration tools surges and so do attacks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-27T04:01:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Use of cloud collaboration tools surges and so do attacks\",\"datePublished\":\"2020-05-27T04:01:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks\\\/\"},\"wordCount\":730,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks.jpg\",\"keywords\":[\"Cloud Security\",\"Collaboration\",\"cyber attacks\",\"Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks\\\/\",\"name\":\"Use of cloud collaboration tools surges and so do attacks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks.jpg\",\"datePublished\":\"2020-05-27T04:01:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud Security\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cloud-security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Use of cloud collaboration tools surges and so do attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Use of cloud collaboration tools surges and so do attacks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Use of cloud collaboration tools surges and so do attacks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-05-27T04:01:00+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Use of cloud collaboration tools surges and so do attacks","datePublished":"2020-05-27T04:01:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks\/"},"wordCount":730,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks.jpg","keywords":["Cloud Security","Collaboration","cyber attacks","Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks\/","url":"https:\/\/www.threatshub.org\/blog\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks\/","name":"Use of cloud collaboration tools surges and so do attacks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks.jpg","datePublished":"2020-05-27T04:01:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/use-of-cloud-collaboration-tools-surges-and-so-do-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cloud Security","item":"https:\/\/www.threatshub.org\/blog\/tag\/cloud-security\/"},{"@type":"ListItem","position":3,"name":"Use of cloud collaboration tools surges and so do attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35191","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=35191"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35191\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/35192"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=35191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=35191"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=35191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}