It’s a vulnerability that’s discovered and exploited before it’s known to or addressed by the maker/vendor. So in this case, the North Korean hackers were exploiting an unknown vulnerability in a software package commonly used by security researchers.
Thanks! That’s pretty close to what I thought it was. However it looked like it was being referred to as a specific tactic or program. Thanks for clearing it up!
It’s a vulnerability that’s discovered and exploited before it’s known to or addressed by the maker/vendor. So in this case, the North Korean hackers were exploiting an unknown vulnerability in a software package commonly used by security researchers.
Thanks! That’s pretty close to what I thought it was. However it looked like it was being referred to as a specific tactic or program. Thanks for clearing it up!