Lucene search

K

Following the LNK metadata trail

🗓️ 19 Jan 2023 13:19:00Reported by Guilherme VenereType 
talosblog
 talosblog
🔗 blog.talosintelligence.com👁 224 Views

Adversaries shift to LNK files for initial access. Talos identifies threat actor activity and relationships using LNK metadata

Show more
Related

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo