By Ben Baker, Edmund Brumaghin, JJ Cummings and Arnaud Zobec. Threat summary After initially compromising corporate networks, the attacker behind WastedLocker performs privilege escalation and lateral […]
As remote work and collaboration intensified during the Movement Control Order (MCO), cloud adoption has emerged as an ally for enterprises. While Malaysian enterprises have been […]