The threat actors are abusing the vulnerabilities to gain initial access, obtain credentials, and install malicious scripts on user devices.
First seen on darkreading.com
Jump to article: www.darkreading.com/vulnerabilities-threats/cisa-ivanti-vulns-chained-attacks