Cybercriminals are constantly evolving their tactics. In this session, we'll show how attackers sidestep endpoints through real-life attack scenarios like creating malicious Microsoft 365 apps, exploiting vulnerable remote access gateways, and compromising the software supply chain. We'll dive into exactly how these attacks are carried out and give strategies to better defend against them.