Advertisement
Top

How attackers exploit whitelists

April 10, 2017

Category:

If there is a technology or security measure that can help organizations protect their assets from attackers or malware, you can be sure that attackers will try to find a way to bypass it.

And, with the increase of number of security solutions implemented by organizations, it is to be expected that there will be some that can be made to play one against the other.

As noted by freelance security consultant and ISC handler Xavier Mertens, attackers have been known to take advantage of organizations’ whitelist system to prevent the blacklist system from keeping their malware and exploits away from the organizations’ networks.

Read More on Help Net Security