Today > 10 Critical | 16 High | 29 Medium | 4 Low vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
Threat actors are increasingly using legitimate third-party business software to evade detection and maintain deception. Atlassian's Confluence is being exploited to host malicious content, leveraging its trusted domain status. The attack involves an email with an Excel attachment containing a Docu…