alphacyberranger@sh.itjust.works to Programmer Humor@programming.devEnglish · 2 years agoMalware As A Servicesh.itjust.worksexternal-linkmessage-square94linkfedilinkarrow-up11.29Karrow-down18
arrow-up11.28Karrow-down1external-linkMalware As A Servicesh.itjust.worksalphacyberranger@sh.itjust.works to Programmer Humor@programming.devEnglish · 2 years agomessage-square94linkfedilink
minus-squareslazer2au@lemmy.worldlinkfedilinkEnglisharrow-up15arrow-down1·2 years agoNow threat actors know what EDR they are running and can craft malware to sneak past it. yay(!)
minus-squaremarcos@lemmy.worldlinkfedilinkarrow-up8arrow-down1·2 years agoSmart threat actors use the EDR for distribution. Seems to be working very well for whoever owned Solar Winds.
Now threat actors know what EDR they are running and can craft malware to sneak past it. yay(!)
Smart threat actors use the EDR for distribution. Seems to be working very well for whoever owned Solar Winds.