CISA details RESURGE malware exploiting Ivanti Connect Secure vulnerabilities

Threat actors use a fake Ivanti certificate for authentication, which, although unencrypted, can serve as a network signature for detection. 

Latest articles

Related articles