Are you sure you want to leave? You're just one step away from your free network consultation (valued at $495).
Agenda Ransomware Propagates to vCenters and ESXi via Custom PowerShell Script
Agenda ransomware group uses RMM tools, as well as Cobalt Strike for deployment of the ransomware binary. It can also propagate via PsExec and SecureShell, while also making use of different vulnerable SYS drivers for defense evasion.