Warning: Some posts on this platform may contain adult material intended for mature audiences only. Viewer discretion is advised. By clicking ‘Continue’, you confirm that you are 18 years or older and consent to viewing explicit content.
It’s a vulnerability that’s discovered and exploited before it’s known to or addressed by the maker/vendor. So in this case, the North Korean hackers were exploiting an unknown vulnerability in a software package commonly used by security researchers.
Thanks! That’s pretty close to what I thought it was. However it looked like it was being referred to as a specific tactic or program. Thanks for clearing it up!
It’s a vulnerability that’s discovered and exploited before it’s known to or addressed by the maker/vendor. So in this case, the North Korean hackers were exploiting an unknown vulnerability in a software package commonly used by security researchers.
Thanks! That’s pretty close to what I thought it was. However it looked like it was being referred to as a specific tactic or program. Thanks for clearing it up!