Go back

The Future Belongs to Defenders: Stopping the Silent Cloud Compromise

We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.

Industry Insights
November 6, 2025
5m read
5m read
5m listen
5m watch
5m watch
speakers
speakers
speakers
authors
Patrick Duffy
participants
No items found.
share

We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.

There’s a moment in every breach when everything looks normal. No alarms. No blinking red lights. Just silence.

But somewhere, an adversary is reading your CEO’s inbox. They’re not detonating malware or brute-forcing firewalls. They’re scrolling. Learning. Waiting. And they didn’t need to break in to do it. They signed in.

For years, that silence has been the soundtrack of modern intrusion. And I’ve spent most of my career listening to it.

What I Learned Standing Next to the Best Defenders

At Expel, I had the privilege of working alongside some of the most talented SOC and D&R engineers in the world, people who could take an alert and turn it into an investigation in minutes. I watched them fight complex intrusions with precision and empathy. But I also watched them struggle. Not because they weren’t good, but because the battlefield was shifting under their feet.

The attacks weren’t coming through endpoints anymore. They were coming through inboxes, OAuth consents, and collaboration links. Every new productivity tool was another doorway and the keys were identity tokens, not exploits.

When I joined Material, it was because I saw a team ready to fight that next war, the one where the inbox is the new endpoint and identity is the new perimeter.

APT-29 Is the Adversary of Our Time

APT-29 doesn’t smash through firewalls or drop ransomware payloads. They embed themselves inside your trusted systems and operate under the radar of traditional defenses. They weaponize consent, abuse legitimate APIs, and live comfortably inside SaaS ecosystems we all rely on.

They are methodical, patient, and devastatingly effective. It’s not because they’re superhuman, but because our defenses still live in silos, protecting against yesterday’s threats.

We keep deploying tools that detect symptoms instead of campaigns. Email systems flag a message. EDR looks at a device. Network monitors traffic. And while everyone’s watching their own screen, APT-29 is already three steps ahead, using your infrastructure as their weapon.

That’s not just a technical failure. It’s a philosophical one.

Defending Where They Attack

Material was built to end this. We don’t just detect.  We see the campaign, the whole thing, from inbox to identity to data.

We treat phishing as the start of the story, not the end. We link that first message to every downstream action: the login from a new ASN, the risky OAuth grant, the quiet Drive share, the configuration tweak that gives an adversary persistence.

When those things happen, Material doesn’t wait for a human to piece it together.

We can roll back the OAuth grant, freeze the share, revoke the token, snapshot the evidence, and push everything back to your SIEM so you can see exactly how the campaign unfolded.

The goal isn’t to drown analysts in alerts; it’s to give them a timeline, a story, a handle on reality. That’s how you win. Not by adding another console, but by automating the responses and remediations that make sense, and making context visible and easily accessible to analysts when deeper investigation is needed.

From Silence to Signal

APT-29 (and groups like them) thrive on invisibility. They win when your systems don’t talk to each other, when your defenses live in different worlds.

So we built Material to make that silence impossible. When the inbox, the identity provider, and the collaboration layer all feed one another, you stop fighting symptoms and can actually stop the campaigns.

And here’s the truth: this isn’t just about nation-states. The same tradecraft is showing up in insider threats, ransomware affiliates, and financially motivated groups. If we can neutralize APT-29, we can stop all of them.

The Future Belongs to Defenders

I’ve never been a SOC analyst. But I stood next to them. I’ve seen what world-class defenders can do when they have the right visibility and the right tools. They don’t want dashboards. They want understanding. They want control. And they need technology that’s as capable as the people attacking them.

That’s what we’re building at Material. We’re working to give them the visibility and control to detect and respond to threats instantly. We’re building to detect attacks, minimize risk, stop threats, and to prevent attackers from stealing the one thing that can never be recovered: time.

Because when the next APT-29 campaign lands in an inbox, it shouldn’t be the start of a breach. It should be the end of one.

We’re done letting attackers weaponize trust. We’re done letting silence hide compromise. And we’re done accepting that “cloud compromise” is inevitable. Material exists to make it unthinkable.

They don’t break in anymore. They sign in. And we’re here to sign them out.

Frequently Asked Questions

Find answers to common questions and get the details you need.

No items found.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

The Legacy OAuth Detection Model Doesn't Survive AI Agents

Traditional OAuth governance fails against AI agents because their unpredictable, prompt-driven behavior is invisible at the grant layer, requiring security teams to pivot to real-time activity-layer detection.

Abhishek Agrawal
8
m read
Read post
Podcast

The Legacy OAuth Detection Model Doesn't Survive AI Agents

Traditional OAuth governance fails against AI agents because their unpredictable, prompt-driven behavior is invisible at the grant layer, requiring security teams to pivot to real-time activity-layer detection.

8
m listen
Listen to episode
Video

The Legacy OAuth Detection Model Doesn't Survive AI Agents

Traditional OAuth governance fails against AI agents because their unpredictable, prompt-driven behavior is invisible at the grant layer, requiring security teams to pivot to real-time activity-layer detection.

8
m watch
Watch video
Downloads

The Legacy OAuth Detection Model Doesn't Survive AI Agents

Traditional OAuth governance fails against AI agents because their unpredictable, prompt-driven behavior is invisible at the grant layer, requiring security teams to pivot to real-time activity-layer detection.

8
m listen
Watch video
Webinar

The Legacy OAuth Detection Model Doesn't Survive AI Agents

Traditional OAuth governance fails against AI agents because their unpredictable, prompt-driven behavior is invisible at the grant layer, requiring security teams to pivot to real-time activity-layer detection.

8
m listen
Listen episode
blog post

We Analyzed 702 HIPAA Breaches. The Problem Isn't the Phish — It's What's Already in the Inbox.

An analysis of 702 HIPAA breaches reported to HHS — and the control gap most organizations are missing.

Material Team
10
m read
Read post
Podcast

We Analyzed 702 HIPAA Breaches. The Problem Isn't the Phish — It's What's Already in the Inbox.

An analysis of 702 HIPAA breaches reported to HHS — and the control gap most organizations are missing.

10
m listen
Listen to episode
Video

We Analyzed 702 HIPAA Breaches. The Problem Isn't the Phish — It's What's Already in the Inbox.

An analysis of 702 HIPAA breaches reported to HHS — and the control gap most organizations are missing.

10
m watch
Watch video
Downloads

We Analyzed 702 HIPAA Breaches. The Problem Isn't the Phish — It's What's Already in the Inbox.

An analysis of 702 HIPAA breaches reported to HHS — and the control gap most organizations are missing.

10
m listen
Watch video
Webinar

We Analyzed 702 HIPAA Breaches. The Problem Isn't the Phish — It's What's Already in the Inbox.

An analysis of 702 HIPAA breaches reported to HHS — and the control gap most organizations are missing.

10
m listen
Listen episode
blog post

Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action

New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.

Kate Hutchinson
4
m read
Read post
Podcast

Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action

New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.

4
m listen
Listen to episode
Video

Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action

New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.

4
m watch
Watch video
Downloads

Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action

New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.

4
m listen
Watch video
Webinar

Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action

New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.

4
m listen
Listen episode
blog post

The Emerging Attack Surface: Your Cloud Workspace

The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.

Rajan Kapoor, VP, Security
10
m read
Read post
Podcast

The Emerging Attack Surface: Your Cloud Workspace

The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.

10
m listen
Listen to episode
Video

The Emerging Attack Surface: Your Cloud Workspace

The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.

10
m watch
Watch video
Downloads

The Emerging Attack Surface: Your Cloud Workspace

The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.

10
m listen
Watch video
Webinar

The Emerging Attack Surface: Your Cloud Workspace

The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.

10
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

New