Many attackers lurk undetected for months, then pounce, study finds
Attackers who penetrate company networks often pose as legitimate users for long periods of time, causing lengthy delays before victims figure out they’ve been hacked. FireEye’s Mandiant…