The Las Vegas gunman was able to access the internet before he fired at a concert that was set to begin on Sunday.
He used a virtual private network, or VPN, to bypass security, according to security experts.
This means that the attacker was able access the site while others around him were not, according the researchers.
The researchers are calling the exploit an ‘exploit’ and believe that it was designed to allow the gunman to gain access to sensitive information that would be valuable to him.
“The use of a VPN to access a protected site via a VPN means that there is no requirement for the attacker to know the destination of the VPN connection,” the researchers wrote.
Their findings are based on two different VPNs.
One VPN allowed the attacker access to a domain that was owned by the FBI, and another VPN allowed him to access an external server that was hosted on a private server.
Both servers were hosted by the same company called Fusion.
These two VPNs were used to access “the website for the venue where the shooting took place,” the research said.
There are two types of VPNs, and each has its advantages and disadvantages.
Using a VPN allows users to bypass the VPN protocol, allowing the attacker’s information to reach the outside world.
But this can also open the door to compromise, as the attacker can bypass security measures that would otherwise protect the user.
In this case, the researchers believe the attack was designed so that the attackers could access sensitive information on the external server.
The researchers said the attack “does not appear to be a deliberate attempt to access sensitive personal information, but rather to gain unauthorized access to data and network resources.”
This can be done by someone using a VPN, or by someone who simply wants to gain administrative access to the target’s server.
They said the exploit could also allow the attacker “to execute arbitrary code on the server that is running Fusion’s Fusion Web Framework.”
While they say this is “not the case with other exploits used by ISIL or any other terrorist group,” they believe the exploit is “likely” to be “more widespread” than previously thought.
“The FBI and other law enforcement agencies are aware of this vulnerability and are actively working with the Fusion Web Foundation to address it,” the report said.
This is not the first time a security vulnerability has been used by the ISIL group.
In May, a report by security firm FireEye said that ISIL was using a similar exploit to exploit a flaw in its WebKit browser.
The group had exploited the same flaw before, using it to bypass its own WebKit sandbox, which meant it was able “to exploit vulnerabilities that allowed them to exploit an existing vulnerability in Microsoft’s Flash Player,” according to the FireEye report.
However, the exploit was only used to take advantage of a critical flaw in the browser, not the other vulnerabilities that were patched earlier in 2017.
In December 2017, researchers at security firm Symantec said that the group had used a similar vulnerability to exploit “an exploit in Microsoft Edge that allowed the group to gain elevated privileges on an organization’s Windows-based systems.”
But in August, Symantech said that this was not the case, and that the exploit used the same CVE as the one exploited by ISIL.