May 12, 2022, 7:05 p.m. | SC Staff

SC Magazine feed for Risk Management www.scmagazine.com

BleepingComputer reports that threat actors have been deploying the "highly sophisticated" IceApple post-exploitation framework on Microsoft Exchange Servers.

breach cloud security data security exchange exploit iceapple microsoft microsoft exchange servers

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Information Security Senior Analyst

@ Media.Monks | Americas: USA + Canada

Senior Program Associate- Cybersecurity Awareness (Remote)

@ Fannie Mae | Washington, DC, United States

Cybersecurity Specialist - Endpoint Security

@ Hexagon US Federal | Huntsville, AL