Attackers target Telecommunications sector to gain network access
Threat Level – Red | Vulnerability Report
Download PDFTo gain initial access, the adversary used social engineering to impersonate IT, staff, using phone calls, SMS, and/or Telegram. When the adversary gains access to the target environment, it performs constant activity within that environment.
What’s new on HivePro
Get through updates and upcoming events, and more directly in your inbox