How To Create A Threat Model in 7 Easy Steps With Our Template
How To Create A Threat Model in 7 Easy Steps With Our Threat Model Template Our team here at Alias is made up of hackers turned security professionals. In fact, ...
If you think you were impacted from the Exchange zero-day vulnerability, you can run the list of IPs below in Virus Total to search for any potential indicators of compromise.
Download them here.
Download the NMAP script here.
165.232.154.116
157.230.221.198
104.248.49.97
103.77.192.219
104.140.114.110
104.250.191.110
108.61.246.56
149.28.14.163
167.99.168.251
185.250.151.72
192.81.208.169
203.160.69.66
211.56.98.146
5.254.43.18
5.2.69.14
80.92.205.81
91.192.103.43
161.35.45.41
45.77.252.175
Reach out to the team here at Alias if you have any questions at all regarding the zero-day.
We’re here to bring you peace of mind.
Written by: Alias
Blog Alias
How To Create A Threat Model in 7 Easy Steps With Our Threat Model Template Our team here at Alias is made up of hackers turned security professionals. In fact, ...
Copyright 2019 Cyber Security Design Concept by <a href="http://qantumthemes.com?rel=demo" target="_blank">QantumThemes</a>.