Send to Kindle

Targeted attacks might be tough to prevent, but
what if you could fight back against the attacker once he’s infiltrated
your network? A researcher has come up with a proof-of-concept (PoC)
that does just that by finding vulnerabilities in the attacker’s malware
and using it against him. Read the full article. [Dark Reading]

Send to Kindle
Categories: Data Breaches, Malware, Social Engineering, Vulnerabilities, Web Security