Today > 1 Critical | 3 High | 6 Medium vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
An analysis reveals that threat actors have developed custom malware based on the open-source SapphireStealer to harvest credentials from employees of Russian companies. The malicious operation involves deploying a modified version of the stealer malware, specifically tailored to target organizatio…