WASHINGTON (Reuters) - Cybersecurity expert Steven Adair and his team were in the final stages of purging the hackers from a think tank's network earlier this year when a suspicious pattern in the log data caught their eye.
The spies had not only managed to break back in – a common enough occurrence in the world of cyber incident response – but they had sailed straight through to the client's email system, waltzing past the recently refreshed password protections like they didn't exist.
Already a subscriber? Log in.
Subscribe or renew your subscriptions to win prizes worth up to RM68,000!
Cancel anytime. No ads. Auto-renewal. Unlimited access to the web and app. Personalised features. Members rewards.