WASHINGTON (Reuters) - Cybersecurity expert Steven Adair and his team were in the final stages of purging the hackers from a think tank's network earlier this year when a suspicious pattern in the log data caught their eye.
The spies had not only managed to break back in – a common enough occurrence in the world of cyber incident response – but they had sailed straight through to the client's email system, waltzing past the recently refreshed password protections like they didn't exist.
Already a subscriber? Log in
Play, subscribe and stand a chance to win prizes worth over RM39,000! T&C applies.
Cancel anytime. Ad-free. Unlimited access with perks.
