The New Attack: Penetrate and Tailor

In its latest security report Cisco identifies a trend I hadn’t heard of before with malware writers: Closer inspection of those computers they’ve successfully penetrated to see whether there’s something interesting there, and then if there is targeting that company (or organisation) with a more tailored follow-up attack: Attackers can—and do— segregate infected computers into …

Continue reading ‘The New Attack: Penetrate and Tailor’ »