Organisations can uphold zero trust security benefits for noncompliant infrastructure through two methods. First, by isolating such systems within a segmented network to control access, and second, adopting a strategy employing proxy-based approach to mediate traffic and enforce policies to these parts.

Gamaredon Hackers Weaponize LNK Files to Deliver Remcos backdoor
Cisco Talos discovered a consistent cyber campaign by threat group Gamaredon against Ukrainian users. The campaign uses spear-phishing tactics, sending malicious LNK files disguised as