IceApple

Cybersecurity specialists reported the detection of a new post-exploitation framework that would allow the compromise of Microsoft Exchange servers. Identified as IceApple, this framework was developed by threat actors capableRead More →