Liam Tung
| October 27, 2021
| Topic: Security
Why the same old cyber attacks are still so successful and what needs to be done to stop them
Watch Now
Cyber attackers aren’t just looking for software flaws, supply chain weakness, and open RDP connections. The other key asset hackers are after is identities, especially account details that will give them access to other internal systems.
CISA earlier this year warned that the suspected Kremlin-backed hackers behind the SolarWinds attacks were not just trojanising software updates, but also password guessing and password spraying administrative accounts for initial access.
Related Topics:
Microsoft
Security TV
Data Management
CXO
Data Centers
Liam Tung
| October 27, 2021
| Topic: Security