In this blog, we highlight four tools representing a unique infection chain utilized by NOBELIUM: EnvyScout, BoomBox, NativeZone, and VaporRage. These tools have been observed being used in the wild as early as February 2021 attempting to gain a foothold on a variety of sensitive diplomatic and government entities.| Microsoft Security Blog
Application Layer Protocol:| attack.mitre.org
Expert coverage on security matters such as zero trust, identity and access management, threat protection, information protection, and security management.| Microsoft Security Blog