Blog Series
Remote access trojans
PHP Vulnerability Used For Malware...
The cybercrime landscape has recently seen multiple threat actors exploiting a known PHP vulnerability. As per recent media reports, the vulnerability is exploited to deliver crypto miners, distributed denial-of-service (DDoS)...