« Attackers have learned to make use of built-in tools to evade detection. The novel use of the serial console by attackers is a reminder that these attacks are no longer limited to the operating system layer. » #threats [ https://www.mandiant.com/resources/blog/sim-swapping-abuse-azure-serial ] #informatique