Short Takes – 6-7-23

Adversaries increasingly using vendor and contractor accounts to infiltrate networks. TalosIntelligence.com blog post. Pull quote: “Vendors may remotely access the environment intermittently or at unusual times, making it difficult for…