In view of the recent emergence of suspected hacker attacks with national technology and resource background, Microsoft has actually predicted in the 2020 edition of “Digital Defense Report”. Although so far, Microsoft has not found any loopholes in its products or cloud services in the relevant investigation, but the company still issued a reminder in a blog post, hoping that customers can take effective and important steps to prevent them from becoming victims of such network attacks. < p > < p > in this paper, Microsoft listed some technical details of the complex network attacks carried out by malicious agents, such as intrusion through malicious code in solarwindsorion products. If the attacker succeeds, the subsequent hackers may take this as a springboard to gain higher privileges in the network. < / P > < p > secondly, the attacker can gain access to trusted SAML signature certificate in the organization by using local stolen administrator rights. Then, by forging SAML token, the user can impersonate the account of any existing user in the organization, even the account with higher privilege. < / P > < p > in order to deal with such abnormal logins, it is recommended that customers should make appropriate security configuration on the network system to distinguish the trusted certificates for accessing local or cloud resources. Since SAML token uses self signed certificate, it is likely that this part of exception will be ignored in the organization. < / P > < p > after using the above or other technologies to gain access to the privileged account, the attacker can also add his own login credentials to the existing application service principal, so as to obtain the permissions of relevant applications and call the API. < / P > < p > as for the complete event analysis during the covid-19 pandemic and the community’s attitude towards network security, Microsoft will elaborate in the full 2020 Digital Defense Report. IPhone 12 whole family barrel model exposed: it’s a tribute to iPhone 4