Media coverage

How hackers use hidden tunnels to steal data and avoid detection

Sorry, this post has not been published yet, check again later!

June 25, 2018
Published by:

The Wall Street Journal

“It’s just like taking apart a car, moving it in small pieces and reassembling it on the outside,” says Chris Morales, head of security analytics at Vectra. Hidden tunnels can be created by hackers after they get a foothold into a company’s network through, for example, phishing attacks or exploiting an unpatched vulnerability.

Read publication

Most recent media coverage

Ensuring secure data centre operations and avoiding cyberattacks

September 29, 2020

Intelligent Data Centres

Read more

Inside the unusual world of cyber insurance, where ransoms are legally paid to criminal hackers

September 27, 2020

The Telegraph

Read more

Warning: Attackers Exploiting Windows Server Vulnerability

September 25, 2020

Gov Info Security

Read more