Atlassian Confluence Zero-Day Actively Exploited in the Wild
Threat Level Vulnerability Report For a detailed threat advisory, download the pdf file here Summary A critical zero-day flaw, identified as CVE-2023-22515, affecting Confluence Data Center and Server instances is being actively exploited. This remotely exploitable vulnerability enables external attackers to create unauthorized Confluence administrator accounts …
‘Looney Tunables’ Flaw Enables Local Privilege Escalation in Glibc
Threat Level Vulnerability Report For a detailed threat advisory, download the pdf file here Summary CVE-2023-4911, also known as “Looney Tunables,” is a critical buffer overflow vulnerability discovered in the GNU C Library’s dynamic loader, specifically in the processing of the GLIBC_TUNABLES environment variable. The vulnerability …
EvilProxy Phishing Attack Targets Indeed Job Platform
Threat Level Attack Report For a detailed threat advisory, download the pdf file here Summary A new phishing campaign has emerged, specifically targeting high-profile US executives. This campaign takes advantage of open redirects from the jobs platform Indeed and employs EvilProxy to pilfer session cookies. Stolen …
Exim Vulnerable to Zero-Day Remote Code Execution Attacks
Threat Level Vulnerability Report For a detailed threat advisory, download the pdf file here Summary Six zero-day vulnerabilities have been discovered in the Exim Internet Mailer, potentially putting thousands of email servers worldwide at risk. These vulnerabilities, if successfully exploited, could result in information disclosure and …
Attacks, Vulnerabilities and Actors 25 September to 1 October 2023
For a detailed threat digest, download the pdf file here Summary HiveForce Labs has recently made several significant discoveries related to cybersecurity threats. Over the past week, we identified a total of eight executed attacks, three instances of adversary activity, and four zero-day vulnerabilities, highlighting the …
CISA Known Exploited Vulnerability Catalog September 2023
For a detailed CISA’s KEV Catalog, download the pdf file here Summary The Known Exploited Vulnerability (KEV) catalog, maintained by CISA, is the authoritative source of vulnerabilities that have been exploited in the wild. To be included in the catalog, a vulnerability must meet three criteria: …
AtlasCross Exploits Organizations with DangerAds and AtlasAgent Trojans
Threat Level Attack Report For a detailed threat advisory, download the pdf file here Summary A new threat actor by the name of AtlasCross has been identified employing phishing tactics that use Red Cross-themed lures as part of their attack strategy. These phishing campaigns are being …
BlackTech: China-Linked Cyber Actors Exploit Router Firmware
Threat Level Actor Report For a detailed threat advisory, download the pdf file here Summary BlackTech, a People’s Republic of China (PRC)-linked cyber actor group, poses a significant threat by modifying router firmware and targeting diverse sectors, highlighting the need for enhanced cybersecurity measures. To receive …
Google and Firefox fixes Zero-Day Flaw Exploited in the Wild
Threat Level Vulnerability Report For a detailed threat advisory, download the pdf file here Summary A zero-day vulnerability, CVE-2023-5217, is actively exploited and has been patched in both Google Chrome and Firefox browsers. CVE-2023-5217 is a Heap buffer overflow vulnerability discovered in the vp8 encoding component …