Threat Actors, TA505 and MERCURY, Exploiting ZeroLogon to Attack and Gain Account Control Privileges

Sorry, this post has not been published yet, check again later!

October 12, 2020
Published by:

Security Magazine

With Microsoft's recent warning about more cybercriminals exploiting ZeroLogon in attacks, there's been much discussion on the ways to combat this vulnerability. Our EMEA director, Matt Walmsley, advises that security teams should pay close attention to systems which can report when user accounts or hosts are being used to access network services and objects they don’t normally access.

Read publication

Most recent media coverage

Threat Actors Targeted Slack and Discord as the Pandemic Raged On

April 8, 2021

SC Magazine

Read more

New Report Reveals Collaboration Platform Security Risks

April 8, 2021

Security Magazine

Read more

Apple to Start Enforcing New App Privacy Notifications

April 8, 2021

Security Magazine

Read more