Ben CardAug 18, 20222 minMost Exploited Flaws to Date in 2022Latest reporting indicates that the most exploited network access vulnerabilities in the first half of 2022 are “ProxyShell”.
Ben CardAug 15, 20223 minAttackers Scanning Within 15 Minutes of Zero-Day DisclosuresThreat actors now begin scanning for vulnerable systems within 15 minutes of disclosure of new Common Vulnerabilities and Exposures (CVEs).
Ben CardAug 8, 20223 minMassive AitM Campaign Bypasses 2FAA brand new, global-scale phishing campaign is using adversary-in-the-middle (AitM) techniques to bypass security protections like MFA.