Hackers Can Change Their Attack Methodology In A Day
I then asked the vendor to take us step-by-step of how they were going to detect APT using the details of what the APT last did to the customer. I wanted to know how the APT was detected , since they used a zero-day exploit to capture a local admin password that they then used to act as the legitimate user across the network, doing thing s that the legitimate user could do. I asked them how their product was going to tell the difference between the legitimate user doing their usual job and APT using that same user’s credentials to do the same thing. Granted, there are many ways to do this, depending on how the product works, but in this case, the appliance being touted didn’t have those sorts of capabilities. You could have heard a pin drop in the room. The vendor was silent for an uncomfortably long time, before saying that they would need to do some research and get back to us, which they never did. I saved that customer millions of dollars that day. If more vendors were held acc...