>The vulnerabilities, credited to Google’s TAG (Threat Analysis Group)
Do they find these by monitoring the brokers of zero days or analyzing devices of people who are being targeted?
replies(4):
Do they find these by monitoring the brokers of zero days or analyzing devices of people who are being targeted?
they also have insane peering and backbone network infra, run one of the largest cloud providers, host basically everyone's email, documents, and file storage, chat, app store, and have a native browser installed
I'm sure they have many different signals they can look at to see compromised type behavior differing from the profile they have on you