Microsoft patches massive remote access vulnerability
"Attackers need to be in the network and in a position between clients and servers," says Chris Morales, Vectra head of security analytics. "If they are already deep in the network, there are many other things they could do to scope out a network, find authentication accounts and compromise a server."
The United States Sanction Russia in Response to Cyberattacks
President Biden Issues Sanctions Against Russia For Cyberattacks, Election Interference
Russian Foreign Intelligence Service Exploiting Five Publicly Known Vulnerabilities to Compromise U.S. and Allied Networks