As organizations move to cloud services and multifactor authentication, cookies tied to identity and authentication give attackers a new path to compromise.
After gaining access via RDP, all three threat actors encrypted files, in an investigation complicated by event log clearing and backups. 3 attackers, 2 weeks – 1 entry point.
Sophos’ latest Active Adversary report explores the issue of organizations being hit multiple times by attackers
Six presentations in Las Vegas this week cover multiple cybersecurity applications of machine learning