How hackers use hidden tunnels to steal data and avoid detection

Sorry, this post has not been published yet, check again later!

June 25, 2018
Published by:

The Wall Street Journal

“It’s just like taking apart a car, moving it in small pieces and reassembling it on the outside,” says Chris Morales, head of security analytics at Vectra. Hidden tunnels can be created by hackers after they get a foothold into a company’s network through, for example, phishing attacks or exploiting an unpatched vulnerability.

Read publication

Most recent media coverage

Cyber Conflict Overshadowed a Major Government Ransomware Alert

April 26, 2022

Dark Reading

Read more

Latest T-Mobile Data Breach Has Some Wondering ‘How Lapsus$ Got Access in the First Place’

April 22, 2022

Channel Futures

Read more

Vectra Research Exposes Cybersecurity Health Crisis

April 7, 2022

Intelligent CISO

Read more