Threat dissection | Dec 11, 2020
Anatomy of an Attack: Gaining Remote Access Using Valid Credentials
When adversaries obtain valid credentials, they can leverage external-facing remote services to gain unauthorized access and/or persist within a network. This threat dissection covers the challenges of suspicious remote access incidents and highlights how proprietary machine learning tools Malkara and esLOG work together to detect them.