Also known as a third-party attack or a value-chain attack, advisory groups gain access to a targeted victims network by first infiltrating a business partner's network that has access to the victim's systems or data.
Want to check another podcast?
Enter the RSS feed of a podcast, and see all of their public statistics.