Threat Advisories

You are here:

Latest Advisory

Voicemail-Based Remote Access Attack image

EXECUTIVE SUMMARY Attackers are using fake voicemail notifications to socially engineer users into installing a legitimate remote management tool, granting attackers persistent remote access to compromised systems. By exploiting trust, routine user behaviour, and signed tools rather than software flaws, the campaign achieves high impact with minimal technical complexity. TECHNICAL...

Explore Advisories

Previous Advisories

AWS CodeBuild Vulnerability image

Optimize Your Cloud Journey