Cloud AV Can Serve as an Avenue for Exfiltration

Discussion in '0-day Release' started by Petrovic, Jul 15, 2017.

  1. Petrovic

    Petrovic Forum Addict Silver Member

    Black Hat USA researchers show how bad guys can use cloud AV connections to bypass air-gaps and extremely segmented networks to keep stolen data flowing.
    Over the past few years, security researchers have been drawing increasing attention to the fact that under the right circumstances security products could potentially be used to attack the very machines they're meant to protect. For the most part, the body of work on this front tends to fixate on authentication bypasses and attack techniques early in the attack lifecycle.
    Full Article
    Gabbs, kram7750, RGiskardR and 2 others like this.
  2. Google Adsense

Share This Page