you're finding ways for a targeted attack. I don't think most victims are targeted.
-
-
AV is not *routinely* exploited. Browser/PDF/Flash/Office are.
1 reply 0 retweets 0 likes -
All 4 of those other categories are WAY WAY HARDER to exploit than AV!
1 reply 0 retweets 0 likes -
Yet attackers keep exploiting them instead. Strange, no?
1 reply 0 retweets 1 like -
Replying to @VessOnSecurity @dnlongen and
It’s a statement of verifiable fact.
1 reply 0 retweets 0 likes -
Yes, and the fact is that they are exploited by real attackers yet AV isn't.
1 reply 0 retweets 0 likes -
Replying to @VessOnSecurity @tqbf and
Now, of course, there is a good reason for this - and it is not very favorable for AV, BTW.
1 reply 0 retweets 0 likes -
Replying to @VessOnSecurity @tqbf and
But the reason is NOT that AV is "easier to exploit".
2 replies 0 retweets 0 likes -
Replying to @VessOnSecurity @tqbf and
The reason is because a targeted attack does not NEED to exploit AV vulnerabilities.
1 reply 0 retweets 1 like -
Replying to @VessOnSecurity @tqbf and
A targeted attack can bypass a known AV without bothering with exploits.
1 reply 0 retweets 1 like
First explain to @tqbf your theory about how attackers only use exploits because they're faster, or it won't make sense.
-
-
Attackers use the easiest thing that would work. In the vast majority of cases this isn't "exploits"; it's commodity malware.
0 replies 0 retweets 0 likesThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.