alphacyberranger@sh.itjust.works to Programmer Humor@programming.devEnglish · 1 年前Malware As A Servicesh.itjust.worksimagemessage-square94fedilinkarrow-up11.29Karrow-down18
arrow-up11.29Karrow-down1imageMalware As A Servicesh.itjust.worksalphacyberranger@sh.itjust.works to Programmer Humor@programming.devEnglish · 1 年前message-square94fedilink
minus-squareslazer2au@lemmy.worldlinkfedilinkEnglisharrow-up15arrow-down1·1 年前Now threat actors know what EDR they are running and can craft malware to sneak past it. yay(!)
minus-squaremarcos@lemmy.worldlinkfedilinkarrow-up8arrow-down1·1 年前Smart threat actors use the EDR for distribution. Seems to be working very well for whoever owned Solar Winds.
Now threat actors know what EDR they are running and can craft malware to sneak past it. yay(!)
Smart threat actors use the EDR for distribution. Seems to be working very well for whoever owned Solar Winds.