Welcome to Smokey's Security Forums.
Guests only have limited access to the board and it's features, please consider registering to gain full access!
Registration is free and it only takes a few moments to complete.

Smokey's Security Forums

Please login or register.

Login with username, password and session length
Advanced search  

News:

Locky ransomware: Why this menace keeps coming back

It's one of the most successful forms of ransomware.
Here's why the Locky ransomware keeps disappearing - only to reappear again.

Locky ransomware: Why this menace keeps coming back

Malware Log Analysis & Removal Help * Ransomware Encryption & Decrytion Techniques * Official Jetico Inc. Support Forums

Share this topic on FacebookShare this topic on MySpaceShare this topic on RedditShare this topic on TwitterAuthorTopic: The Benefits of Exploiting Attackers' Favorite Tools  (Read 16 times)

0 Members and 1 Guest are viewing this topic.

QuizmasterTopic starter

  • Flying Nurse
  • Seasonal Competition Team
  • *
  • Offline Offline
  • location: USA - Miami,FL
  • Posts: 22710
  • .: Surf Queen
    • WWW
The Benefits of Exploiting Attackers' Favorite Tools
« Reply #1 on: August 22, 2017, 08:15:36 PM »
The Benefits of Exploiting Attackers' Favorite Tools
22 August 2017, 5:15 pm

Symantec senior threat researcher Waylon Grange explains that attackers write vulnerable code, too.

Source: Dark Reading:

>> To obtain the full Dark Reading article, click the link in the first post line <<
 

* Permissions
You can't post new topics.
You can't post replies.
You can't post attachments.
You can't modify your posts.
BBCode Enabled
Smilies Enabled
[img] Enabled
HTML Disabled


Except where otherwise stated, all content, graphics, banners and images included © 2006 - 2017 Smokey Services™ -- All rights reserved
Design board graphics, banners and images by Meg&Millie - Emma aka Tinker

This site does not store profiling-, tracking-, third-party and/or any other non-essential cookie(s) on client computers and is fully compliant with the EU ePrivacy Directive
Smokey's does not use any Web Analytics/Analysis Service, and also does not use any browser fingerprinting techniques

    

  

Smokey's also provides free fully qualified FRST (Farbar Recovery Scan Tool) Log / Malware Analysis & Removal Help and System Health Checks
rifle
rifle
rifle
rifle