Zero-Day: Vulnerabilities, Exploits, Attacks and How to Manage Them
Kaseya
SEPTEMBER 21, 2021
Originally developed by NASA as a cyberattack tool, it was stolen and leaked by the Shadow Brokers hacking group in March 2017. The infection can take the form of a virus, Trojan horse, worm, spyware, adware, rootkit or other malware like ransomware. At the top of the charts is EternalBlue, the most damaging exploit in history.
Let's personalize your content