Results of Major Technical Investigations for Storm-0558 Key Acquisition (How a threat actor acquired and used a Microsoft signing key to access customer emails)
Results of Major Technical Investigations for Storm-0558 Key Acquisition (How a threat actor acquired and used a Microsoft signing key to access customer emails)
msrc.microsoft.com
Results of Major Technical Investigations for Storm-0558 Key Acquisition | MSRC Blog | Microsoft Security Response Center