Threat actors use a fake Ivanti certificate for authentication, which, although unencrypted, can serve as a network signature for detection.
CISA details RESURGE malware exploiting Ivanti Connect Secure vulnerabilities
Related articles
Latest articles
Related articles
Popular articles
Featured
Newsletter
Subscribe to get the latest news, offers and special announcements.
