Talk With an Expert

The Hacker Always Gets Through

The Hacker Always Gets Through (PDF, 2.50MB)Published: 15 Apr, 2014
Created by:
TJ O'Connor

In early 2010, security analysts started noticing something really interesting. Attackers from several Chinese hacker groups shifted from a strategy of remote and overt attacks to a stealthy strategy of attacking from compromised pivot points within our own networks. These changing tactics demand significant examination and discussion. Fortunately for us, this strategy allows us to make clearer predictions about the depth of our enemy's exploit arsenal, the ability to develop newer attack vectors, and the adversary's perception of our defensive strategy.