Phase of a typical cyber adversary group's attack sequence, after the initial compromise and usually after the group has established a command and control channel, where the group moves through the victims network by compromising as many systems as it can, by looking for the data, it has come to steal or to destroy.
Anfitriones e invitados
Información
- Programa
- FrecuenciaCada semana
- Publicado14 de enero de 2025, 08:00 UTC
- Duración8 min
- Temporada2
- Episodio66
- ClasificaciónApto