supply chain attacks

  • Technical

EDR Evasion: How Hackers Get Past Endpoint Defenses

Reading Time: 11 mins EDR Evasion includes a suite of techniques that hackers use to elude endpoint defenses. Discover how…

1 year ago
  • Attacks

Advisory Alert: All About the 3CX Desktop App Attack

Reading Time: 2 mins Our Threat Intelligence Team has discovered approximately 70,000 instances potentially exposed to a dangerous vulnerability in…

1 year ago