Evidence of Exploitation
There are 10 primary rules that can impact the assigned Threat score and they are:
|
•
|
It has been linked to remote access Trojan |
|
•
|
It has been linked to ransomware |
|
•
|
It has been linked to penetration testing tools |
|
•
|
It has been linked to malware |
|
•
|
It has been linked to an exploit kit |
|
•
|
It has been linked to a cyber exploit |
|
•
|
It has been linked to an exploit wild |
|
•
|
It has been linked to POC verified |
|
•
|
It has been linked to vulnerability developed tools |
|
•
|
It has been linked to verified intelligence |