Analyzing ProxyShell-related Incidents via Trend Micro Managed XDR

In this blog entry, we will take a look at the ProxyShell vulnerabilities that were being exploited in these events, and dive deeper into the notable post-exploitation routines that were used in four separate incidents involving these web shell attacks.

Article Link: Analyzing ProxyShell-related Incidents via Trend Micro Managed XDR