Today > vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
This analysis describes the identification of a server likely exploiting ProxyLogon and ProxyShell vulnerabilities to gain unauthorized access to government email servers across Asia, Europe, and South America. The threat actor leveraged open-source exploit code to infiltrate systems and steal sens…