APT28 used SNMP access to exploit Cisco routers and gain network access, utilizing weak SNMP community strings and exploiting a vulnerability to deploy Jaguar Tooth.
Get through updates and upcoming events, and more directly in your inbox
CTEM for CISOs in 2025, brought to life by Al Lindseth.