article thumbnail

How Are Computers Compromised (2020 Edition)

Adam Shostack

Understanding the way intrusions really happen is a long-standing interest of mine. ” How the intrusion happens is about questions like: Is it phishing emails that steal creds? This is quite a different set of questions compared to “how long does it take to detect,” or “how many records are stolen?”

Mining 49