Media coverage

How hackers use hidden tunnels to steal data and avoid detection

Sorry, this post has not been published yet, check again later!

June 25, 2018
Published by:

The Wall Street Journal

“It’s just like taking apart a car, moving it in small pieces and reassembling it on the outside,” says Chris Morales, head of security analytics at Vectra. Hidden tunnels can be created by hackers after they get a foothold into a company’s network through, for example, phishing attacks or exploiting an unpatched vulnerability.

Read publication

Most recent media coverage

Jusqu’où l’intelligence artificielle peut-elle réduire le déficit d’experts en cybersécurité?

April 17, 2019

Solutions Numeriques

Read more

AI at the US Department of Homeland Security – Current Projects

April 16, 2019

Emerj

Read more

How Organizations Use Threat Intelligence To Boost Security

April 15, 2019

BrightTalk

Read more