How cyberattackers exploit group policies | Securelist

https://securelist.com/group-policies-in-cyberattacks/115331/