By Ben Baker, Edmund Brumaghin, JJ Cummings and Arnaud Zobec. Threat summary After initially compromising corporate networks, the attacker behind WastedLocker performs privilege escalation and lateral […]
With the SecureX Threat Hunting feature, organizations can add an active, managed threat hunting practice to their environment As advanced threats continue to proliferate throughout an organizations’ IT infrastructure, […]