Confluence exploits used to drop ransomware on vulnerable servers
Automated attacks are now widely exploiting the Atlassian vulnerability
Automated attacks are now widely exploiting the Atlassian vulnerability
Attacker targets bugs in a popular web application graphical interface development tool
On the trail of malicious PowerShell artifacts too large to be contained in a single log? Help is on the way.
Attackers took two months to craft and install PowerShell scripts as services before deploying the ransomware