this post was submitted on 03 Sep 2024
14 points (100.0% liked)
Security News
2279 readers
1 users here now
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Did I overlook the most important thing, or did they not write a word on how this thing actually ends up on ones computer?
Since this is an offshoot of BlackCat, some experts say exploits in remote access software.