When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

“The product can be exploited through a vulnerable URL.”

Federal organizations have until December 16 to patch the software.

An abstract image of padlocks overlaying a digital background.

(Image credit: Shutterstock)

Going after US-based targets is not that common, it would seem.

Earth Kasha seems to be tied to the APT10 advanced persistent threat.

Their campaigns often involve credential dumping, DLL side-loading, and encrypted payloads.

ViaThe Hacker News

You might also like