In December, roughly a dozen employees inside a manufacturing company received a tsunami of phishing messages that was so big they were unable to perform their day to day functions. A little over an hour later, the people behind the email flood had burrowed into the nether reaches of the company network. This is a story about how such intrusions are occurring faster than ever before and the tactics that make this speed possible. The speed and precision of the attack—laid out in posts published...
