Adversaries may leverage external-facing remote services to initially access and/or persist within a network.
See: MITRE ATT&CK
Adversaries may leverage external-facing remote services to initially access and/or persist within a network.
See: MITRE ATT&CK