Additional Insights on Shamoon2

IBM analysts recently unveiled a first look at how threat actors may have placed Shamoon2 malware on systems in Saudi Arabia. Researchers showcased a potential malware lifecycle which started with spear phishing and eventually led to the deployment of the disk-wiping malware known as Shamoon. […]

Source: Additional Insights on Shamoon2


Posted

in

by

Tags:

Comments

One response to “Additional Insights on Shamoon2”

  1. Tshibuka Avatar

    Hi great reaading your post

Leave a comment