The Department of Energy Department of Labor attack is the latest example of a multi-stage attack. Attackers use server-side vulnerabilities at legitimate sites to exploit malware-laden sites, experts say. Experts say organizations can’t depend on signatures to detect these kinds of attacks. Organizations also need to find ways to tie in both network and endpoint behavioral detection to track behavior across stages of attacks, says TaaSera’s David Nevin. Nevin: Organizations must instead have detection capabilities geared primarily at seeking out anomalous behavior.”]