Adversaries may gain access to and use centralized software suites installed within an enterprise to execute commands and move laterally through the network.
See: MITRE ATT&CK
Adversaries may gain access to and use centralized software suites installed within an enterprise to execute commands and move laterally through the network.
See: MITRE ATT&CK
2 items with this tag.