Threat Actors, TA505 and MERCURY, Exploiting ZeroLogon to Attack and Gain Account Control Privileges

Sorry, this post has not been published yet, check again later!

October 12, 2020
Published by:

Security Magazine

With Microsoft's recent warning about more cybercriminals exploiting ZeroLogon in attacks, there's been much discussion on the ways to combat this vulnerability. Our EMEA director, Matt Walmsley, advises that security teams should pay close attention to systems which can report when user accounts or hosts are being used to access network services and objects they don’t normally access.

Read publication

Most recent media coverage

Bugcrowd Reports Ethical Hackers Prevented $27B in Cybercrime

November 17, 2021

Tech News World

Read more

Most Ethical Hackers Identifying Vulnerabilities They Did Not See Before the Pandemic

November 16, 2021

SC Magazine

Read more

SOC Modernisation: A Digital Labrador for Next-Level Cybersecurity

November 15, 2021

Security Review

Read more