Threat Advisories:
Highlights of Our CISO Dinner
Upgrading struggling vulnerability management programs to Threat Exposure Management, with Host, CISO Al Lindseth formerly from Plains All American Pipeline and PWC - 6 minute podcast
0:00
0:00
👥 Play Count: Loading...

Attackers target Telecommunications sector to gain network access

Threat Level – Red | Vulnerability Report
Download PDF

To gain initial access, the adversary used social engineering to impersonate IT, staff, using phone calls, SMS, and/or Telegram. When the adversary gains access to the target environment, it performs constant activity within that environment.

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox