Still doesn't make much sense to me - a way to stay ahead.. by pathing WinXP vulns ?
http://blog.kennasecurity.com/2016/05/collaborative-data-science-inside-the-2016-verizon-dbir-vulnerability-section/ … @attritionorg
@thierryzoller yep. will be writing another blog commenting on the updates. some other questionable bits in it.
-
-
@attritionorg : like very difficult to exploit vulns, or vulns that are DoS leaving no IOC "post attack". This doesn't add up -
@thierryzoller their answers raise more questions like that, yep. will have another blog coming
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.