For those of us who study the evolution of cyber warfare over the years, it is terrifying to investigate the extreme power, the tactics, the methods and the dogma of current attacks.
Key and Certificate based attacks - Code signing certificates - Weak Crypto exploits - SSH Key theft - APT1 - Malicious Executable - Server Key theft...
No shooting just clicking!