Hackers are increasingly using remote monitoring and management (RMM) software as a first step in cyberattacks, particularly in email campaigns, according to researchers at cybersecurity firm Proofpoint. Criminals have moved away from tools such as loaders and botnet malware which were commonly used to gain initial access into systems and are instead turning to RMM solutions. Threat groups are targeting compromised systems for varied reasons, including data exfiltration, financial theft, and installing malware.

M&S still rebuilding after April cyber incident – Digital Watch Observatory
Summarize this content to a maximum of 60 words: M&S still rebuilding after April cyber incident Digital Watch Observatory