
Iran-linked Lyceum Group adds a new weapon to its arsenal. [Research Saturday]
CyberWire Daily
00:00
Inspecting a Tractor
It's critical that you are inspecting. The second important piece over here is, assume that your controls fail at that first stage. You need to have, again, inspection for all ports and protocol in order to flag. So the point is have that post infection activity getting detected and blocked,. Have the data excilration channel get detected and blocked as well.
Play episode from 09:33
Transcript


