According to a report from NopSec, cyber attackers are increasingly using Twitter to disseminate proof-of-concept exploits. The report also found that cyber attackers are more focused on the outcomes of the attacks rather than the ease of exploiting vulnerabilities. Exploit techniques are also becoming more sophisticated, with 98% of tracked exploit kits coming from Microsoft, Adobe Flash and Oracle Java.
![](https://healsecurity.com/wp-content/uploads/2024/07/group-ibs-threat-intelligence-and-defence-centre-equip-undergraduates-with-sophisticated.jpg)
Group-IB’s Threat Intelligence and Defence Centre Equip Undergraduates with Sophisticated Cybersecurity Technologies to Boost Threat Analysis and Enhance Cyber Resilience for Campus Start-ups
Hey there from the heart of the San Francisco Bay Area! It’s an absolute pleasure to have you back again for our chat on some