Security News > 2019 > March > How Three of 2018's Critical Threats Used Email to Execute Attacks

2019-03-21 16:38
History Tends to Repeat Itself - Attackers Repurpose Tried and Tested Methods to Launch Attacks read more
News URL
Related news
- Outsmarting Cyber Threats with Attack Graphs (source)
- CISA tags critical Ivanti EPM flaws as actively exploited in attacks (source)
- Critical PHP RCE vulnerability mass exploited in new attacks (source)
- ClickFix attack delivers infostealers, RATs in fake Booking.com emails (source)
- Critical RCE flaw in Apache Tomcat actively exploited in attacks (source)
- Critical GitHub Attack (source)
- Critical Cisco Smart Licensing Utility flaws now exploited in attacks (source)
- Ongoing Cyber Attacks Exploit Critical Vulnerabilities in Cisco Smart Licensing Utility (source)
- Hidden Threats: How Microsoft 365 Backups Store Risks for Future Attacks (source)
- Critical auth bypass bug in CrushFTP now exploited in attacks (source)