In this week’s episode we report on:
GhostToken flaw, which allowed invisible persistence, patched and visible.
AuKill tool used in attack pipeline to kill EDR processes.
PoC exploit code available for Papercut flaw, which allows server takeover.
Call us directly and we’ll put you in touch with the most relevant cyber expert.
Not currently free to call? Give us a brief description of what you’re looking for by filling out our form and we’ll email you as soon as we can.