exploits

WDigest credential harvesting

WDigest, a legacy authentication protocol that is still in use on many corporate networks, presents opportunities for attackers to acquire passwords. Its abuse essentially nullifies…

Read more

Motivated miners

In recent months, multiple security vendors published articles about “motivated miners”—attackers who take advantage of tools, techniques, and procedures (TTPs) developed by advanced threat actors…

Read more