CISA’s Known Exploited Vulnerabilities (KEV) catalog includes four weaknesses found in the product in recent years, including ...
A threat actor known as Zestix has been offering to corporate data stolen from dozens of companies likely after breaching ...