Go back

The Future Belongs to Defenders: Stopping the Silent Cloud Compromise

We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.

Industry Insights
November 6, 2025
5m read
5m read
5m listen
5m watch
5m watch
speakers
speakers
speakers
authors
Patrick Duffy
participants
No items found.
share

We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.

There’s a moment in every breach when everything looks normal. No alarms. No blinking red lights. Just silence.

But somewhere, an adversary is reading your CEO’s inbox. They’re not detonating malware or brute-forcing firewalls. They’re scrolling. Learning. Waiting. And they didn’t need to break in to do it. They signed in.

For years, that silence has been the soundtrack of modern intrusion. And I’ve spent most of my career listening to it.

What I Learned Standing Next to the Best Defenders

At Expel, I had the privilege of working alongside some of the most talented SOC and D&R engineers in the world, people who could take an alert and turn it into an investigation in minutes. I watched them fight complex intrusions with precision and empathy. But I also watched them struggle. Not because they weren’t good, but because the battlefield was shifting under their feet.

The attacks weren’t coming through endpoints anymore. They were coming through inboxes, OAuth consents, and collaboration links. Every new productivity tool was another doorway and the keys were identity tokens, not exploits.

When I joined Material, it was because I saw a team ready to fight that next war, the one where the inbox is the new endpoint and identity is the new perimeter.

APT-29 Is the Adversary of Our Time

APT-29 doesn’t smash through firewalls or drop ransomware payloads. They embed themselves inside your trusted systems and operate under the radar of traditional defenses. They weaponize consent, abuse legitimate APIs, and live comfortably inside SaaS ecosystems we all rely on.

They are methodical, patient, and devastatingly effective. It’s not because they’re superhuman, but because our defenses still live in silos, protecting against yesterday’s threats.

We keep deploying tools that detect symptoms instead of campaigns. Email systems flag a message. EDR looks at a device. Network monitors traffic. And while everyone’s watching their own screen, APT-29 is already three steps ahead, using your infrastructure as their weapon.

That’s not just a technical failure. It’s a philosophical one.

Defending Where They Attack

Material was built to end this. We don’t just detect.  We see the campaign, the whole thing, from inbox to identity to data.

We treat phishing as the start of the story, not the end. We link that first message to every downstream action: the login from a new ASN, the risky OAuth grant, the quiet Drive share, the configuration tweak that gives an adversary persistence.

When those things happen, Material doesn’t wait for a human to piece it together.

We can roll back the OAuth grant, freeze the share, revoke the token, snapshot the evidence, and push everything back to your SIEM so you can see exactly how the campaign unfolded.

The goal isn’t to drown analysts in alerts; it’s to give them a timeline, a story, a handle on reality. That’s how you win. Not by adding another console, but by automating the responses and remediations that make sense, and making context visible and easily accessible to analysts when deeper investigation is needed.

From Silence to Signal

APT-29 (and groups like them) thrive on invisibility. They win when your systems don’t talk to each other, when your defenses live in different worlds.

So we built Material to make that silence impossible. When the inbox, the identity provider, and the collaboration layer all feed one another, you stop fighting symptoms and can actually stop the campaigns.

And here’s the truth: this isn’t just about nation-states. The same tradecraft is showing up in insider threats, ransomware affiliates, and financially motivated groups. If we can neutralize APT-29, we can stop all of them.

The Future Belongs to Defenders

I’ve never been a SOC analyst. But I stood next to them. I’ve seen what world-class defenders can do when they have the right visibility and the right tools. They don’t want dashboards. They want understanding. They want control. And they need technology that’s as capable as the people attacking them.

That’s what we’re building at Material. We’re working to give them the visibility and control to detect and respond to threats instantly. We’re building to detect attacks, minimize risk, stop threats, and to prevent attackers from stealing the one thing that can never be recovered: time.

Because when the next APT-29 campaign lands in an inbox, it shouldn’t be the start of a breach. It should be the end of one.

We’re done letting attackers weaponize trust. We’re done letting silence hide compromise. And we’re done accepting that “cloud compromise” is inevitable. Material exists to make it unthinkable.

They don’t break in anymore. They sign in. And we’re here to sign them out.

Frequently Asked Questions

Find answers to common questions and get the details you need.

No items found.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

Rajan Kapoor, VP, Security
m read
Read post
Podcast

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

m listen
Listen to episode
Video

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

m watch
Watch video
Downloads

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

m listen
Watch video
Webinar

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

m listen
Listen episode
blog post

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

Mike Moran, Ph.D.
7
m read
Read post
Podcast

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m listen
Listen to episode
Video

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m watch
Watch video
Downloads

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m listen
Watch video
Webinar

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m listen
Listen episode
blog post

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

Nate Abbott
3
m read
Read post
Podcast

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m listen
Listen to episode
Video

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m watch
Watch video
Downloads

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m listen
Watch video
Webinar

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m listen
Listen episode
blog post

The Future Belongs to Defenders: Stopping the Silent Cloud Compromise

We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.

Patrick Duffy
5
m read
Read post
Podcast

The Future Belongs to Defenders: Stopping the Silent Cloud Compromise

We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.

5
m listen
Listen to episode
Video

The Future Belongs to Defenders: Stopping the Silent Cloud Compromise

We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.

5
m watch
Watch video
Downloads

The Future Belongs to Defenders: Stopping the Silent Cloud Compromise

We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.

5
m listen
Watch video
Webinar

The Future Belongs to Defenders: Stopping the Silent Cloud Compromise

We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.

5
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

New