Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Assuming the exfiltration can be differentiated from normal behavior!


Seeing large amounts of encrypted traffic leaving via a DNS tunnel during non-standard business hours for instance would be an example of such an anomaly. It's not always that easy to detect however.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: