top of page

Krebs – Deconstructing the 2014 Sally Beauty Breach

  • Writer: Michael Trotter-Lawson
    Michael Trotter-Lawson
  • May 8, 2015
  • 1 min read

This breakdown is a perfect example of having good security tools but poor monitoring of tool output.  I also personally love the fact that a district manager’s credentials were compromised to gain initial access – the same credentials that the district manager had taped to the front of his/her laptop.

Recent Posts

See All
bottom of page