Instead of sharing plenty of light case studies with similar scenarios and remediations, three primary case studies have been handpicked, showcasing different attack vectors and appropriate resolutions. Due to confidentiality and sensitivity issues, one of the case studies is kept anonymous, but the attacks are depicted as accurately as possible.
Case Study 1: Anonymous
Context
An employee of AZ1 Inc. had carried a personal laptop into the company premises. As it turned out, the laptop was infected with Poison Ivy trojan, which the employee was unaware of. After it was connected with ...