RSAC insights: Malware is now spreading via weaponized files circulating in data lakes, file shares
The Last Watchdog
JUNE 3, 2022
It does this by permitting only known good files into a network, while at the same time extracting unknown and untrusted elements for analysis. The attacker managed to insert attack code into a zip file contained in a password-protected email message – one that the banker was expecting to receive from the attorney.
Let's personalize your content