Evidence of Exploitation

There are 10 primary rules that can impact the assigned Threat score and they are:

It has been linked to remote access Trojan
It has been linked to ransomware
It has been linked to penetration testing tools
It has been linked to malware
It has been linked to an exploit kit
It has been linked to a cyber exploit
It has been linked to an exploit wild
It has been linked to POC verified
It has been linked to vulnerability developed tools
It has been linked to verified intelligence