Today > vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
This intelligence report details a sophisticated malware campaign targeting multiple industries across various countries. The threat actor employs advanced tactics, techniques, and procedures (TTPs) to infiltrate networks, maintain persistence, and exfiltrate sensitive data. The malware used in thi…