Targeted attacks might be tough to prevent, but
what if you could fight back against the attacker once he’s infiltrated
your network? A researcher has come up with a proof-of-concept (PoC)
that does just that by finding vulnerabilities in the attacker’s malware
and using it against him. Read the full article. [Dark Reading]
Researcher Demos PDF Counter Attacks
Author:
Donald Sears
minute read
Share this article:
Targeted attacks might be tough to prevent, but
what if you could fight back against the attacker once he’s infiltrated
your network? A researcher has come up with a proof-of-concept (PoC)
that does just that by finding vulnerabilities in the attacker’s malware
and using it against him. Read the full article. [Dark Reading]