Publié par : pintejp | mars 29, 2017

Security researchers at Palo Alto Networks have determined that the Shamoon 2 malware uses a rudimentary technique for network distribution.

Security researchers at Palo Alto Networks continue to analyze the dreaded Shamoon 2 malware and the recent waves of attacks, now they have determined that the threat uses a rudimentary technique for network distribution.

http://securityaffairs.co/wordpress/57485/malware/shamoon-2-network-distribution.html


Laisser un commentaire

Catégories