Today, we have released a brand new lab on how a malicious actor has been gaining access to endpoints through the use of phishing and a virtual machine. You will analyze how the technique works and what information is quickly available for indicators of compromise!
Updated 9 months ago
Version 1.0