Summary Adversaries have embraced a new vector for getting a grip on a targeted company, adding to their already extensive arsenal of skills. Unfortunately, while trying to keep their firms’ networks secure, defenders have had to document and plan for practically every approach adversary could employ against them. Fortunately, many…