alphacyberranger@sh.itjust.works to Programmer Humor@programming.devEnglish · 1 year agoMalware As A Servicesh.itjust.worksimagemessage-square94fedilinkarrow-up11.28K
arrow-up11.28KimageMalware As A Servicesh.itjust.worksalphacyberranger@sh.itjust.works to Programmer Humor@programming.devEnglish · 1 year agomessage-square94fedilink
minus-squareslazer2au@lemmy.worldlinkfedilinkEnglisharrow-up15·1 year agoNow threat actors know what EDR they are running and can craft malware to sneak past it. yay(!)
minus-squaremarcos@lemmy.worldlinkfedilinkarrow-up8·1 year agoSmart threat actors use the EDR for distribution. Seems to be working very well for whoever owned Solar Winds.
Now threat actors know what EDR they are running and can craft malware to sneak past it. yay(!)
Smart threat actors use the EDR for distribution. Seems to be working very well for whoever owned Solar Winds.