To the execs: it's almost like you should assume you're already popped, and start paying for actual threat hunting professionals to find evidence of it.
Reposted from Marcus Hutchins
A simple experiment you can do is buy a server, set up a website with nothing on it, then look at the access logs. All day, every day, there are random systems just blasting vulnerabilities at every device on the internet. Analysts call it "background noise", executives call it "cyber attacks".

Comments