Go back

The Future Belongs to Defenders: Stopping the Silent Cloud Compromise

We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.

Industry Insights
November 6, 2025
5m read
5m read
5m listen
5m watch
5m watch
speakers
speakers
speakers
authors
Patrick Duffy
participants
No items found.
share

We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.

There’s a moment in every breach when everything looks normal. No alarms. No blinking red lights. Just silence.

But somewhere, an adversary is reading your CEO’s inbox. They’re not detonating malware or brute-forcing firewalls. They’re scrolling. Learning. Waiting. And they didn’t need to break in to do it. They signed in.

For years, that silence has been the soundtrack of modern intrusion. And I’ve spent most of my career listening to it.

What I Learned Standing Next to the Best Defenders

At Expel, I had the privilege of working alongside some of the most talented SOC and D&R engineers in the world, people who could take an alert and turn it into an investigation in minutes. I watched them fight complex intrusions with precision and empathy. But I also watched them struggle. Not because they weren’t good, but because the battlefield was shifting under their feet.

The attacks weren’t coming through endpoints anymore. They were coming through inboxes, OAuth consents, and collaboration links. Every new productivity tool was another doorway and the keys were identity tokens, not exploits.

When I joined Material, it was because I saw a team ready to fight that next war, the one where the inbox is the new endpoint and identity is the new perimeter.

APT-29 Is the Adversary of Our Time

APT-29 doesn’t smash through firewalls or drop ransomware payloads. They embed themselves inside your trusted systems and operate under the radar of traditional defenses. They weaponize consent, abuse legitimate APIs, and live comfortably inside SaaS ecosystems we all rely on.

They are methodical, patient, and devastatingly effective. It’s not because they’re superhuman, but because our defenses still live in silos, protecting against yesterday’s threats.

We keep deploying tools that detect symptoms instead of campaigns. Email systems flag a message. EDR looks at a device. Network monitors traffic. And while everyone’s watching their own screen, APT-29 is already three steps ahead, using your infrastructure as their weapon.

That’s not just a technical failure. It’s a philosophical one.

Defending Where They Attack

Material was built to end this. We don’t just detect.  We see the campaign, the whole thing, from inbox to identity to data.

We treat phishing as the start of the story, not the end. We link that first message to every downstream action: the login from a new ASN, the risky OAuth grant, the quiet Drive share, the configuration tweak that gives an adversary persistence.

When those things happen, Material doesn’t wait for a human to piece it together.

We can roll back the OAuth grant, freeze the share, revoke the token, snapshot the evidence, and push everything back to your SIEM so you can see exactly how the campaign unfolded.

The goal isn’t to drown analysts in alerts; it’s to give them a timeline, a story, a handle on reality. That’s how you win. Not by adding another console, but by automating the responses and remediations that make sense, and making context visible and easily accessible to analysts when deeper investigation is needed.

From Silence to Signal

APT-29 (and groups like them) thrive on invisibility. They win when your systems don’t talk to each other, when your defenses live in different worlds.

So we built Material to make that silence impossible. When the inbox, the identity provider, and the collaboration layer all feed one another, you stop fighting symptoms and can actually stop the campaigns.

And here’s the truth: this isn’t just about nation-states. The same tradecraft is showing up in insider threats, ransomware affiliates, and financially motivated groups. If we can neutralize APT-29, we can stop all of them.

The Future Belongs to Defenders

I’ve never been a SOC analyst. But I stood next to them. I’ve seen what world-class defenders can do when they have the right visibility and the right tools. They don’t want dashboards. They want understanding. They want control. And they need technology that’s as capable as the people attacking them.

That’s what we’re building at Material. We’re working to give them the visibility and control to detect and respond to threats instantly. We’re building to detect attacks, minimize risk, stop threats, and to prevent attackers from stealing the one thing that can never be recovered: time.

Because when the next APT-29 campaign lands in an inbox, it shouldn’t be the start of a breach. It should be the end of one.

We’re done letting attackers weaponize trust. We’re done letting silence hide compromise. And we’re done accepting that “cloud compromise” is inevitable. Material exists to make it unthinkable.

They don’t break in anymore. They sign in. And we’re here to sign them out.

Frequently Asked Questions

Find answers to common questions and get the details you need.

No items found.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

The Future Belongs to Defenders: Stopping the Silent Cloud Compromise

We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.

Patrick Duffy
5
m read
Read post
Podcast

The Future Belongs to Defenders: Stopping the Silent Cloud Compromise

We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.

5
m listen
Listen to episode
Video

The Future Belongs to Defenders: Stopping the Silent Cloud Compromise

We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.

5
m watch
Watch video
Downloads

The Future Belongs to Defenders: Stopping the Silent Cloud Compromise

We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.

5
m listen
Watch video
Webinar

The Future Belongs to Defenders: Stopping the Silent Cloud Compromise

We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.

5
m listen
Listen episode
blog post

Live Hacking: Exposing the Reality of Microsoft 365 Breaches

Join Huntress CEO Kyle Hanslovan for a live, technical demonstration exposing real-world Microsoft 365 breaches and modern defense strategies.

Rajan Kapoor, VP, Security
3
m read
Read post
Podcast

Live Hacking: Exposing the Reality of Microsoft 365 Breaches

Join Huntress CEO Kyle Hanslovan for a live, technical demonstration exposing real-world Microsoft 365 breaches and modern defense strategies.

3
m listen
Listen to episode
Video

Live Hacking: Exposing the Reality of Microsoft 365 Breaches

Join Huntress CEO Kyle Hanslovan for a live, technical demonstration exposing real-world Microsoft 365 breaches and modern defense strategies.

3
m watch
Watch video
Downloads

Live Hacking: Exposing the Reality of Microsoft 365 Breaches

Join Huntress CEO Kyle Hanslovan for a live, technical demonstration exposing real-world Microsoft 365 breaches and modern defense strategies.

3
m listen
Watch video
Webinar

Live Hacking: Exposing the Reality of Microsoft 365 Breaches

Join Huntress CEO Kyle Hanslovan for a live, technical demonstration exposing real-world Microsoft 365 breaches and modern defense strategies.

3
m listen
Listen episode
blog post

Shadow AI: The Productivity Tools In Your Security Blind Spot

Unsanctioned AI tool usage by employees is rapidly expanding the attack surface of organizations, creating critical security blind spots that require immediate and informed management to balance productivity and risk.

Nate Abbott
5
m read
Read post
Podcast

Shadow AI: The Productivity Tools In Your Security Blind Spot

Unsanctioned AI tool usage by employees is rapidly expanding the attack surface of organizations, creating critical security blind spots that require immediate and informed management to balance productivity and risk.

5
m listen
Listen to episode
Video

Shadow AI: The Productivity Tools In Your Security Blind Spot

Unsanctioned AI tool usage by employees is rapidly expanding the attack surface of organizations, creating critical security blind spots that require immediate and informed management to balance productivity and risk.

5
m watch
Watch video
Downloads

Shadow AI: The Productivity Tools In Your Security Blind Spot

Unsanctioned AI tool usage by employees is rapidly expanding the attack surface of organizations, creating critical security blind spots that require immediate and informed management to balance productivity and risk.

5
m listen
Watch video
Webinar

Shadow AI: The Productivity Tools In Your Security Blind Spot

Unsanctioned AI tool usage by employees is rapidly expanding the attack surface of organizations, creating critical security blind spots that require immediate and informed management to balance productivity and risk.

5
m listen
Listen episode
blog post

Hack Week 2025 Recap

Our annual Hack Week brings together cross-functional teams to rapidly prototype creative ideas, inspired by customer insights, that improve our product and foster collaboration, innovation, and team bonding.

Abhishek Agrawal
3
m read
Read post
Podcast

Hack Week 2025 Recap

Our annual Hack Week brings together cross-functional teams to rapidly prototype creative ideas, inspired by customer insights, that improve our product and foster collaboration, innovation, and team bonding.

3
m listen
Listen to episode
Video

Hack Week 2025 Recap

Our annual Hack Week brings together cross-functional teams to rapidly prototype creative ideas, inspired by customer insights, that improve our product and foster collaboration, innovation, and team bonding.

3
m watch
Watch video
Downloads

Hack Week 2025 Recap

Our annual Hack Week brings together cross-functional teams to rapidly prototype creative ideas, inspired by customer insights, that improve our product and foster collaboration, innovation, and team bonding.

3
m listen
Watch video
Webinar

Hack Week 2025 Recap

Our annual Hack Week brings together cross-functional teams to rapidly prototype creative ideas, inspired by customer insights, that improve our product and foster collaboration, innovation, and team bonding.

3
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.