![]() ![]() In this article, we’ll provide some more background about this threat, discuss Microsoft’s response, and identify what security measures companies might take. The hacks exploit four “zero-day” vulnerabilities present in Microsoft Exchange servers, allowing the cybercriminals to gain access to on-premise servers and implement a remote takeover.īusinesses, organizations, and IT administrators should not only be aware of the Hafnium attack but practice due diligence by analyzing their IT servers. Cybersecurity experts have been working around the clock this month to combat a massive coordinated hack linked to “Hafnium,” the Chinese state-sponsored hacking group.
0 Comments
Leave a Reply. |