A threat actor — likely a state-sponsored cyberespionage group — has used a sophisticated technique to allow a piece of malware hosted on a server to communicate with command and control (C2) servers through a firewall.
from SecurityWeek RSS Feed https://ift.tt/2PocS3n
via https://ifttt.com/ IFTTT
No comments:
Post a Comment