Attackers commonly use remote administration and network management tools for lateral movement, a new pool of threat data shows. …read more

Source:: DarkReading