Revisiting Phishing Simulations

Revisiting Phishing Simulations

This post was written by Matt Hand and the rest of the SpecterOps team.OverviewSpecterOps is a huge proponent of the “assumed breach” red team execution model where we begin the engagement with ceded access to simulate initial compromise. We believe that this allows us to focus our efforts on areas ... Read More