
Attackers coming in from the Backdoor? [Research Saturday]
CyberWire Daily
00:00
Is It a DDoS Attack?
There's no one way that the attackers were able to get on to the computers. In some cases, they were able to leverage weak es in, let's say, exchange servers. The chances of somebody noticing that some information has gone to the wrong commander or the wrong server is extremely and that's what dacxon makes use of.
Play episode from 10:32
Transcript


