The attacker is targeting virtual private networks and cloud computing vulnerabilities, and has been present in victim networks for several months.
The attacker is targeting virtual private networks and cloud computing vulnerabilities, and has been present in victim networks for several months.