Due to the increase in cloud-based attacks, we picked three devastating and evasive real-world scenarios to show how attackers can gain access and move laterally in SaaS applications to perform reconnaissance and steal sensitive data. This session will show how attackers can exploit API, administrative, and user session vectors to access data in SaaS applications.