Today > 5 Critical | 6 High | 28 Medium vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
This report uncovers a sophisticated intrusion campaign involving several malicious modules designed to disable security solutions and execute a persistent crypto-miner. The primary payload, dubbed GHOSTENGINE, leverages vulnerable drivers to terminate and delete known endpoint detection and respon…