BlackHat 2015: 2FA key to defence against cyber espionage groups

Abuse of credentials and watering-hole attacks are main tactics used by cyber espionage group TG-3390 or Emissary Panda, research reveals