
Attackers coming in from the Backdoor? [Research Saturday]
CyberWire Daily
00:00
Do You Think Malwar Is Behind Daxon Over the Ears?
Daxon is designed to evade and fly under the radar as far as it really can. Large organizations that have a role to play in geal politics should take stock of different files on their computer, see if odit, their power shell locks or permission logs are being used. It would be a lot of good hygiene, good auditing. A recommendations from our side.
Play episode from 14:48
Transcript


