CRITICALAdvisoryApr 08, 2026
Action required
Immediately hunt for indicators of compromise on all firewall management interfaces, VPNs, and network edge devices. Prioritize: review firewall logs for suspicious admin access, check for persistence mechanisms, audit all outbound connections from perimeter devices, and assume lateral movement has occurred until proven otherwise.
Linked articles