Tuesday, July 21, 2015

Beyond the breaches: Understanding the Angler exploit kit

From Sophos Naked Security:

Beyond the breaches: Understanding the Angler exploit kit

The big security news stories these days are often about "this big breach", "that sneaky malware" or "these latest new exploits".

You can see why: many attacks involve some or all of these components.

For example, you can imagine the Target crooks at work, spending time figuring out the right trick to get in, breaching the perimeter, mapping the network, preparing their RAM-scraping malware, and then launching their attack over several weeks.

No comments:

Post a Comment