Once an attacker has established access and pivoted around to the point of gathering the necessary data, they will work on exfiltration of that data. Not all malware will reach this stage. Ransomware, for example, usually has no interest in exfiltrating data. As with the Collection tactic, there’s little guidance on how to mitigate an […]… Read More
The post The MITRE ATT&CK Framework: Exfiltration appeared first on The State of Security.
from The State of Security https://ift.tt/2OOJgKc
via https://ifttt.com/ IFTTT
No comments:
Post a Comment