Cyber criminals are increasingly becoming more sophisticated in their methods of attack. Often we can equate this to the methods of data exfiltration as well. Exfiltration, or exportation, of data is ...
“Passive [enumeration] methods seem to be very under-appreciated”, and there is a lot to learn from listening to our systems. These were the words of Chris Day, senior consultant at MWR, speaking at ...