Since the ongoing “ToolShell” exploitation campaign, in which threat actors attack on-premise Sharpoint servers using a chain of two recently published vulnerabilities[1,2,3], is still on top of the cyber security news[4,5,6,7], I thought it might be a good time to look at the question of how quickly do we – as a global society – actually patch actively-exploited vulnerabilities when it comes to our internet-facing systems.

Hackers Exploit DNS TXT Records for Covert Malware Storage – WebProNews
Hackers Exploit DNS TXT Records for Covert Malware Storage WebProNews