By Vanja Svajcer.
NEWS SUMMARY
We are used to ransomware attacks and big game hunting making the headlines, but there is an undercurrent of other attack types that allow attackers to monetize their efforts in a less intrusive way.Here, we discuss a multi-pronged cyber criminal attack using a number of techniques that should alert blue team members with appropriate monitoring capability but are not immediately obvious to end-users.These threats demonstrate several techniques of the MITRE...
[[ This is only the beginning! Please visit the blog for the complete entry ]]
[[ This is only the beginning! Please visit the blog for the complete entry ]]