Information security
fromTechzine Global
1 week agoSkeleton Key campaign exploits trusted RMM tools
Attackers hijack legitimate remote monitoring and management (RMM) tools, using stolen credentials and signed enterprise software to maintain stealthy persistent backdoors.