Threat Actors, TA505 and MERCURY, Exploiting ZeroLogon to Attack and Gain Account Control Privileges

Sorry, this post has not been published yet, check again later!

October 12, 2020
Published by:

Security Magazine

With Microsoft's recent warning about more cybercriminals exploiting ZeroLogon in attacks, there's been much discussion on the ways to combat this vulnerability. Our EMEA director, Matt Walmsley, advises that security teams should pay close attention to systems which can report when user accounts or hosts are being used to access network services and objects they don’t normally access.

Read publication

Most recent media coverage

Kaseya Victim Struggling with Decryption After REvil Goes Dark

July 16, 2021

ZDNet

Read more

Imminent Ransomware Campaign Targeting Older Appliances

July 15, 2021

Security Magazine

Read more

SonicWall Releases Urgent Security Notice About Actively Targeted EOL Devices

July 15, 2021

Tech Nadu

Read more