❌

Reading view

There are new articles available, click to refresh the page.

The Curious Case of theΒ Comburglar

By Troy Wojewoda During a recent Breach Assessment engagement, BHIS discovered a highly stealthy and persistent intrusion technique utilized by a threat actor to maintain Command-and-Control (C2) within the client’s […]

The post The Curious Case of theΒ Comburglar appeared first on Black Hills Information Security, Inc..

❌