Media coverage

How hackers use hidden tunnels to steal data and avoid detection

Sorry, this post has not been published yet, check again later!

June 25, 2018
Published by:

The Wall Street Journal

“It’s just like taking apart a car, moving it in small pieces and reassembling it on the outside,” says Chris Morales, head of security analytics at Vectra. Hidden tunnels can be created by hackers after they get a foothold into a company’s network through, for example, phishing attacks or exploiting an unpatched vulnerability.

Read publication

Most recent media coverage

What could the Biden presidency mean for cybersecurity?

January 21, 2021

Verdict

Read more

Researchers Find New Form of Malware Used in the SolarWinds Attack

January 20, 2021

Silicon Angle

Read more

#Inauguration2021: Cyber-Experts React as Joe Biden Set to Become 46th US President

January 20, 2021

InfoSecurity

Read more