Categories
Cybersecurity
Zero Disco campaign hits legacy Cisco switches with fileless rootkit payloads
Parts of the exploit are fileless or volatile, with some components disappearing on reboot, while hooks left in memory endure, and some functions are…
Read More