Media coverage

Attackers are quietly creeping inside your perimeter using covert communications

Sorry, this post has not been published yet, check again later!

April 21, 2016
Published by:

Information Age

Whether attackers breach perimeter defences through a targeted exploit or a broadcast botnet campaign, financial and reputational losses for victim organisations begins to occur once cybercriminals move laterally within the network – searching for, and stealing, confidential information and intellectual property, writes Vectra CSO Günter Ollmann.

Read publication

Most recent media coverage

Personal data of 10.6 million MGM resorts guests published on hacking forum

February 20, 2020

Security Magazine

Read more

Celebrity A-Listers, millions of guests have data stolen in MGM resorts breach

February 20, 2020

Secure World

Read more

Millions of ‘MGM Resorts’ clients had their details published on the dark net

February 20, 2020

Tech Nadu

Read more