Dark Reading
CSO
“There seems to be a lot of pride in naming threats,” says Mike Banic, vice president of Vectra Networks, “but a lot of them behave in similar ways, and you don’t need a signature to recognize that. The IP address and the URL may change, but the fundamental behavior will not.”
Latest T-Mobile Data Breach Has Some Wondering ‘How Lapsus$ Got Access in the First Place’
Channel Futures