alphacyberranger@sh.itjust.works to Programmer Humor@programming.devEnglish · 2 年前Malware As A Servicesh.itjust.worksimagemessage-square94fedilinkarrow-up11.28K
arrow-up11.28KimageMalware As A Servicesh.itjust.worksalphacyberranger@sh.itjust.works to Programmer Humor@programming.devEnglish · 2 年前message-square94fedilink
minus-squareslazer2au@lemmy.worldlinkfedilinkEnglisharrow-up15·2 年前Now threat actors know what EDR they are running and can craft malware to sneak past it. yay(!)
minus-squaremarcos@lemmy.worldlinkfedilinkarrow-up8·2 年前Smart threat actors use the EDR for distribution. Seems to be working very well for whoever owned Solar Winds.
Now threat actors know what EDR they are running and can craft malware to sneak past it. yay(!)
Smart threat actors use the EDR for distribution. Seems to be working very well for whoever owned Solar Winds.