Cloud AV Can Serve as an Avenue for Exfiltration

Over the past few years, security researchers have been drawing increasing attention to the fact that under the right circumstances security products could potentially be used to attack the very machines they’re meant to protect. For the most part, the body of work on this front tends to fixate on authentication bypasses and attack techniques early in the attack lifecycle.

Read full news article on Dark Reading: Cloud

 


Date:

Categorie(s):

Tag(s):