Process Injection Tops Attacker Techniques for 2019

Attackers commonly use remote administration and network management tools for lateral movement, a new pool of threat data shows.

from Dark Reading: https://ift.tt/33tY3SG
via IFTTT