You've invested in firewalls and your servers are patched. Clients are running updated anti-malware software and spam and phishing filters are turned up to 11 on your mail servers. Flash?
The Curious Case of the Document Exploiting an Unknown Vulnerability – Part 2: RATs, Hackers and Rihanna
Previously my colleague Wayne talked about an interesting document exploit targeting CVE-2015-1641. In this post, we will talk about who might be behind the attack. We start our correlation with the analysis of the exploit payload – a remote adminis…
0 retweets 0 favorites
14 retweets 5 favorites