Graphology of an Exploit – Fingerprinting exploit authors to help with hunting zero-day exploits in the wild

In the cyber-crime economy, which is all about exploiting vulnerabilities in software and products, the most valuable and prized asset is the ‘zero day’ – a vulnerability for which there is no patch or update available.  Last year, an exploit broker stated it would pay up to $2 million for zero-day jailbreaks of Apple’s iOS…

The post Graphology of an Exploit – Fingerprinting exploit authors to help with hunting zero-day exploits in the wild appeared first on Check Point Software.



from Check Point Software https://ift.tt/3ijH0Zn

No comments:

Post a Comment

Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading

Cybersecurity researchers have uncovered a new phishing campaign that exploits social media private messages to propagate malicious payloads...