In December, roughly a dozen employees inside a manufacturing company received a tsunami of phishing messages that was so big they were unable to perform their day to day functions. A little over an hour later, the people behind the email flood had burrowed into the nether reaches of the company network. This is a story about how such intrusions are occurring faster than ever before and the tactics that make this speed possible. The speed and precision of the attack—laid out in posts published...

Read the full article at Arstechnica