Blog Series
Exploit mitigation strategies
PHP Vulnerability Used For Malware...
The cybercrime landscape has recently seen multiple threat actors exploiting a known PHP vulnerability. As per recent media reports, the vulnerability is exploited to deliver crypto miners, distributed denial-of-service (DDoS)...