alphacyberranger@sh.itjust.works to Programmer Humor@programming.devEnglish · 4 months agoMalware As A Servicesh.itjust.worksimagemessage-square59fedilinkarrow-up11.23K
arrow-up11.23KimageMalware As A Servicesh.itjust.worksalphacyberranger@sh.itjust.works to Programmer Humor@programming.devEnglish · 4 months agomessage-square59fedilink
minus-squareslazer2au@lemmy.worldlinkfedilinkEnglisharrow-up14·4 months agoNow threat actors know what EDR they are running and can craft malware to sneak past it. yay(!)
minus-squaremarcos@lemmy.worldlinkfedilinkarrow-up8·4 months agoSmart threat actors use the EDR for distribution. Seems to be working very well for whoever owned Solar Winds.
Now threat actors know what EDR they are running and can craft malware to sneak past it. yay(!)
Smart threat actors use the EDR for distribution. Seems to be working very well for whoever owned Solar Winds.