Media coverage

How hackers use hidden tunnels to steal data and avoid detection

Sorry, this post has not been published yet, check again later!

June 25, 2018
Published by:

The Wall Street Journal

“It’s just like taking apart a car, moving it in small pieces and reassembling it on the outside,” says Chris Morales, head of security analytics at Vectra. Hidden tunnels can be created by hackers after they get a foothold into a company’s network through, for example, phishing attacks or exploiting an unpatched vulnerability.

Read publication

Most recent media coverage

Vectra AI released its 2020 Spotlight Report on Healthcare

July 1, 2020

TECHx

Read more

Attack Surface Growing for Healthcare Industry

July 1, 2020

SecurityWeek

Read more

Even during pandemic, healthcare orgs successfully fending off attacks

July 1, 2020

SC Magazine

Read more