Krebs – Deconstructing the 2014 Sally Beauty Breach
- Michael Trotter-Lawson
- May 8, 2015
- 1 min read
This breakdown is a perfect example of having good security tools but poor monitoring of tool output. I also personally love the fact that a district manager’s credentials were compromised to gain initial access – the same credentials that the district manager had taped to the front of his/her laptop.