Can we just pick one attacker name and stick to it. The amount of time wasted mapping flying squirrel to titanium toothbrush is unreal. I am just trying to find the link to the paper that details the technique I want to kill
Replying to @dwizzzleMSFT
Wouldn't it be awesome if we called them Sploit Technique Designations? That way we could all get unique STDs and pass them around! (We should probable rename CVEs to Vulnerability Designations while we're at it)
11:35 AM - 23 Apr 2018
0 replies
0 retweets
5 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.