Today > 1 Critical | 5 High | 22 Medium vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
This report explores how the Dolphin Loader, a malware-as-a-service loader, abuses the legitimate ITarian Remote Monitoring and Management (RMM) software to distribute various malware payloads. The loader leverages the built-in functionality of RMM tools, such as remote command execution and system…