Researcher Demos PDF Counter Attacks

Targeted attacks might be tough to prevent, but
what if you could fight back against the attacker once he’s infiltrated
your network? A researcher has come up with a proof-of-concept (PoC)
that does just that by finding vulnerabilities in the attacker’s malware
and using it against him. Read the full article. [Dark Reading]

Targeted attacks might be tough to prevent, but
what if you could fight back against the attacker once he’s infiltrated
your network? A researcher has come up with a proof-of-concept (PoC)
that does just that by finding vulnerabilities in the attacker’s malware
and using it against him. Read the full article. [Dark Reading]

Suggested articles