Still doesn't make much sense to me - a way to stay ahead.. by pathing WinXP vulns ?
http://blog.kennasecurity.com/2016/05/collaborative-data-science-inside-the-2016-verizon-dbir-vulnerability-section/ … @attritionorg
-
-
Replying to @thierryzoller
@thierryzoller yep. will be writing another blog commenting on the updates. some other questionable bits in it.1 reply 0 retweets 0 likes -
Replying to @attritionorg
@attritionorg : like very difficult to exploit vulns, or vulns that are DoS leaving no IOC "post attack". This doesn't add up1 reply 0 retweets 0 likes
Replying to @thierryzoller
@thierryzoller their answers raise more questions like that, yep. will have another blog coming
12:02 PM - 2 May 2016
0 replies
0 retweets
1 like
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.