Today > | 4 Medium | 2 Low vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
The report examines an incident where threat actors leveraged Microsoft's BitLocker encryption utility to deploy unauthorized file encryption on targeted systems. The adversaries employed a sophisticated VBScript that resized disk partitions, modified registry entries, enabled BitLocker with random…