Today > 2 Critical | 34 High | 185 Medium | 1 Low vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
Recent research reveals adversaries increasingly using the Havoc post-exploitation framework to bypass cybersecurity systems. Two campaigns utilizing this framework were analyzed. The first campaign involved phishing emails with malicious archives containing ISO files and LNK files, which downloade…