Russian hackers compromised two different organization to attack the network of a third firm located across the road via ...
Earlier this month, researchers at Volexity reported that “mass exploitation” of the Ivanti Connect Secure vulnerabilities was underway, prompting CISA to release its first emergency directive ...
Experts from Volexity have published an in-depth report on a piece of malware called DeepData. This malware was used by a Chinese threat actor known as BrazenBamboo to steal login credentials ...
Chinese threat actors use a custom post-exploitation toolkit named 'DeepData' to exploit a zero-day vulnerability in Fortinet ...
Researchers at the Google Cloud-owned cybersecurity specialist confirmed findings from Volexity researchers about exploitation of the Connect Secure VPN vulnerabilities. Mandiant researchers ...
As the security consultants from Volexity report, one of their customers was hit. The customer noticed suspicious access to ...