In early 2010, security analysts started noticing something really interesting. Attackers from several Chinese hacker groups shifted from a strategy of remote and overt attacks to a stealthy strategy of attacking from compromised pivot points within our own networks. These changing tactics demand...