20 April 2016 The Intruder's Kill Chain - Detecting a Subtle Presence Hackers are Using Increasingly Sophisticated Methods of Cloaking Their Behavior When Breaching Networks read more Original linkOriginal author: Kevin Townsend