alphacyberranger to Programmer [email protected]English • 1 year agoMalware As A Servicesh.itjust.worksimagemessage-square95fedilinkarrow-up11.29Karrow-down18
arrow-up11.29Karrow-down1imageMalware As A Servicesh.itjust.worksalphacyberranger to Programmer [email protected]English • 1 year agomessage-square95fedilink
minus-squareslazer2aulinkfedilinkEnglish14•1 year agoNow threat actors know what EDR they are running and can craft malware to sneak past it. yay(!)
minus-square@[email protected]linkfedilink7•1 year agoSmart threat actors use the EDR for distribution. Seems to be working very well for whoever owned Solar Winds.
Now threat actors know what EDR they are running and can craft malware to sneak past it. yay(!)
Smart threat actors use the EDR for distribution. Seems to be working very well for whoever owned Solar Winds.