Sept. 12, 2023, 10:16 p.m. |

DataBreachToday.co.uk RSS Syndication www.databreachtoday.co.uk

Hackers Likely Exploited ProxyLogon to Gain Access, Says Eset
Hackers aligned with the Iranian state are targeting vulnerable Microsoft Exchange Servers to deploy a new malware backdoor that has already victimized over two dozen Israeli organizations as part of an ongoing espionage campaign. Hackers' initial access point into systems likely was ProxyLogon.

access access point backdoor ballistic bobcat campaign deploy espionage exchange exploited hackers initial access iranian iranian hackers israeli malware microsoft microsoft exchange organizations point proxylogon servers state systems targeting vulnerable

Director, Cyber Risk

@ Kroll | South Africa

Security Engineer, XRM

@ Meta | New York City

Security Analyst 3

@ Oracle | Romania

Internship - Cyber Security Operations

@ SES | Betzdorf, LU

Principal Product Manager (Network/Security Management) - NetSec

@ Palo Alto Networks | Bengaluru, India

IT Security Engineer

@ Timocom GmbH | Erkrath, Germany