Today > 5 Critical | 6 High | 28 Medium vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
A long-running campaign was identified involving malicious actors impersonating Israeli entities and private companies. The operators delivered payloads through crafted WordPress sites, employing a mix of custom code and open-source malware like Donut and Sliver. While the motivations remain unclea…