Google's Threat Intelligence Group (GTIG) and Mandiant have published an analysis of the BRICKSTORM backdoor espionage ...
Suspected Chinese hackers have used the Brickstorm malware in long-term persistence espionage operations against U.S.
You can't find anything bad if you don't look, right? Medusa ransomware affiliates are among those exploiting a ...
The manufacturer is offering patches, and admins should also isolate affected systems from the Internet. Apparently there have been attacks on the vulnerability ...
BRICKSTORM was first documented by the tech giant last year in connection with the zero-day exploitation of Ivanti Connect ...
Mandiant CTO anticipates 'hearing about this campaign for the next one to two years' Unknown intruders – likely China-linked ...
Backdoor on edge devices allowed a starting point for threat actors to use lateral movement to access VMware vCenter and ESXi ...