Incident Response Actions are Systematically Reversed by Hackers to Maintain Persistence
Analysis of attacks on two cellular carriers have resulted in the identification of threat actions designed to undo mitigations taken by security teams mid-attack. We’d like to think that the attackers only move in a game of cyberattack chess is…