Evidence of Exploitation
There are 10 primary rules that can impact the assigned Threat score and they are:
| • | It has been linked to remote access Trojan |
| • | It has been linked to ransomware |
| • | It has been linked to penetration testing tools |
| • | It has been linked to malware |
| • | It has been linked to an exploit kit |
| • | It has been linked to a cyber exploit |
| • | It has been linked to an exploit wild |
| • | It has been linked to POC verified |
| • | It has been linked to vulnerability developed tools |
| • | It has been linked to verified intelligence |