In this week’s episode we report on:
Large scale exploitation of Palo Alto CVE following PoC disclosures.
Atlassian vulnerability leveraged to deploy Cerber ransomware.
PuTTY flaw can be used to obtain private cryptographic keys.
Call us directly and we’ll put you in touch with the most relevant cyber expert.
Not currently free to call? Give us a brief description of what you’re looking for by filling out our form and we’ll email you as soon as we can.