Zero-Days in Edge Devices Become China's Cyber Warfare Tactic of Choice
Briefly

"The observed sharing of malware and exploit capabilities across Chinese state-sponsored actors is likely enabled by both upstream capability developers and wider domestic policy around software vulnerability discovery and weaponization," the report stated.
For CISOs, this highlights the importance of looking beyond threat actors gaining initial access and ensuring they have the means to detect and respond to such an eventuality," says Mark Kelly, principal threat intelligence analyst at Recorded Future.
Organizations should consider these factors when initially procuring network appliances in order to enhance the ability to detect and respond to threats," according to the report.
Read at Dark Reading
[
add
]
[
|
|
]