HACKINTOSH.ORG | Macintosh discussion forums

Macintosh News => Apple News => Topic started by: HCK on December 03, 2022, 04:05:14 pm



Title: From Bounty to Exploit: Observations About Cybercriminal Contests
Post by: HCK on December 03, 2022, 04:05:14 pm
From Bounty to Exploit: Observations About Cybercriminal Contests

From articles to hackathons, cybercriminals are resorting to crowdsourcing to find more ways to exploit systems. In this blog, we discuss our takeaways and summarize the results of these contests.
Source: From Bounty to Exploit: Observations About Cybercriminal Contests (https://www.trendmicro.com/en_us/research/22/j/from-bounty-to-exploit-observations-about-cybercriminal-contests.html)