An attacker shift toward black box appliances and lower layers of IT infrastructure has left organisations with a huge security gap
“I know how I would do this intentionally and it would look exactly like this. You literally are downloading something from the internet and running it with the highest privileges on the system. It's easy to say 'oops! I didn't know..."