Cyberattackers could exploit CVE-2023-20238 to carry out a variety of nefarious deeds, from data theft and code execution to phishing, fraud, and DoS.
China-linked hackers breached the account of a Microsoft engineer and are suspected of using that access to steal a valuable key that enabled the hack of US officials’ email accounts.
In the face of budget constraints, use these strategies to maintain effective cybersecurity programs.
A recent report sheds light on the evolving nature of email-based attacks and the need for adaptive security measures.
The cyber-espionage group has created a stealthy, hard-to-mitigate network of persistent access across a range of organizations, but the endgame is unclear.