Adversaries may gain access to and use centralized software suites installed within an enterprise to execute commands and move laterally through the network.
See: MITRE ATT&CK
Adversaries may gain access to and use centralized software suites installed within an enterprise to execute commands and move laterally through the network.
See: MITRE ATT&CK
1 item with this tag.