Threat Intelligence
Breaking news, news analysis, and expert commentary on cybersecurity threat intelligence, including tools & technologies.
Three men in reflective jackets standing around a laptop
Application SecurityContractor Software Targeted via Microsoft SQL Server LoopholeContractor Software Targeted via Microsoft SQL Server Loophole
By accessing the MSSQL, threat actors gain admin-level access to the application, allowing them to automate their attacks.
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.