Threat Advisories

You are here:

Latest Advisory

Voicemail-Based Remote Access Attack image

EXECUTIVE SUMMARY Attackers are using fake voicemail notifications to socially engineer users into installing a legitimate remote management tool, granting attackers persistent remote access to compromised systems. By exploiting trust, routine user behaviour, and signed tools rather than software flaws, the campaign achieves high impact with minimal technical complexity. TECHNICAL...

Explore Advisories

Previous Advisories

NPM Credential Theft image
Docker Compose Flaw image
WinRAR Breach image
Qilin Ransomware image
CVE-2025-59234 image

Optimize Your Cloud Journey