alphacyberranger@sh.itjust.works to Programmer Humor@programming.devEnglish · 1 year agoMalware As A Servicesh.itjust.worksimagemessage-square95fedilinkarrow-up11.29K
arrow-up11.29KimageMalware As A Servicesh.itjust.worksalphacyberranger@sh.itjust.works to Programmer Humor@programming.devEnglish · 1 year agomessage-square95fedilink
minus-squareslazer2au@lemmy.worldlinkfedilinkEnglisharrow-up15·1 year agoNow threat actors know what EDR they are running and can craft malware to sneak past it. yay(!)
minus-squaremarcos@lemmy.worldlinkfedilinkarrow-up8·1 year agoSmart threat actors use the EDR for distribution. Seems to be working very well for whoever owned Solar Winds.
Now threat actors know what EDR they are running and can craft malware to sneak past it. yay(!)
Smart threat actors use the EDR for distribution. Seems to be working very well for whoever owned Solar Winds.