Get a Pentest and security assessment of your IT network.

Cyber Security

Researchers use ‘fingerprints’ to track Windows exploit developers

Check Point security researchers have developed a new “fingerprinting”” technique to find the developer of a Windows exploit. The method involves looking for uncommon source code identifiers that can be associated with a specific exploit writer such as unique artifacts (such as strings

Source: code snippets

Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation