Today > | 2 Medium vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
A sophisticated multi-stage PowerShell campaign has been identified, utilizing an LNK file to initiate a sequence of obfuscated scripts. The attack maintains persistence and stealth by connecting with a command-and-control server. It employs Chisel, a fast TCP/UDP tunneling tool, and a Netskope pro…