Media coverage

How hackers use hidden tunnels to steal data and avoid detection

Sorry, this post has not been published yet, check again later!

June 25, 2018
Published by:

The Wall Street Journal

“It’s just like taking apart a car, moving it in small pieces and reassembling it on the outside,” says Chris Morales, head of security analytics at Vectra. Hidden tunnels can be created by hackers after they get a foothold into a company’s network through, for example, phishing attacks or exploiting an unpatched vulnerability.

Read publication

Most recent media coverage

NASA hack blamed on unauthorised Raspberry Pi

June 20, 2019

IT Pro

Read more

Vectra Raises $100M for AI Cloud Cybersecurity

June 19, 2019

TMCNet.com

Read more

Facebook's new cryptocurrency Libra has 'fundamentally bad design', claims top Bitcoin developer

June 19, 2019

The Telegraph

Read more