The Active Adversary Playbook 2022
Cyberattacker behaviors, tactics and tools seen on the frontline of incident response during 2021
Cyberattacker behaviors, tactics and tools seen on the frontline of incident response during 2021
In the wake of December 2021 exposure of a remote code execution vulnerability (dubbed “Log4Shell”) in the ubiquitous Log4J Java logging library, we tracked widespread attempts to scan for and exploit the weakness—particularly among cryptocurrency mining bots. The vulnerability affected hundreds of software products, making it difficult for some organizations to assess their exposure. One…
Read more