Media coverage

How hackers use hidden tunnels to steal data and avoid detection

Sorry, this post has not been published yet, check again later!

June 25, 2018
Published by:

The Wall Street Journal

“It’s just like taking apart a car, moving it in small pieces and reassembling it on the outside,” says Chris Morales, head of security analytics at Vectra. Hidden tunnels can be created by hackers after they get a foothold into a company’s network through, for example, phishing attacks or exploiting an unpatched vulnerability.

Read publication

Most recent media coverage

Vectra expands into Asia-Pacific, appoints ex-Telstra exec as regional director

August 19, 2019

ARN

Read more

Cognito-owner Vectra comes to Australia

August 19, 2019

CRN Australia

Read more

Cybersecurity company Vectra sets up APAC HQ in Sydney

August 19, 2019

Which-50

Read more