In modern computing, organizations are constantly barraged with new threats, risks, and vulnerabilities. Security staff are frequently in short supply and overworked, and priority and budget are allocated to systems like client desktops, servers, networking equipment, and cloud deployments. Yet, what recent research shows is that what is being protected isn’t necessarily what is being attacked.
Article Link: Enter Through the Gift Shop: Door Controls, Phones & Rootkits - Eclypsium