Security flaws in multiple Adobe products
Threat Level Vulnerability Report For a detailed threat advisory, download the pdf file here Summary Adobe has issued security upgrades to address a number of vulnerabilities in its products. An attacker can use some of these flaws to gain control of a vulnerable system. …
Google releases Chrome 106 to address Vulnerabilities
Threat Level Vulnerability Report For a detailed threat advisory, download the pdf file here Summary Google Chrome addresses multiple vulnerabilities with its latest stable channel update for Windows, Mac, and Linux. …
VMware could not fix a vulnerability that has been disclosed for eleven months
Threat Level Vulnerability Report For a detailed threat advisory, download the pdf file here Summary VMware disclosed a vulnerability in November 2021 that has not been fixed as of October 2022. VMware initially patched this vulnerability, but later discovered that it did not fix it. The …
Earth Aughisky uses a new set of malware
Threat Level Actor Report For a detailed threat advisory, download the pdf file here Summary Earth Aughisky, a well-known cyber espionage group is exploiting legitimate accounts, software, applications, and other weaknesses by conducting a spearphishing campaign to disrupt everyday activities of organizations mainly in Japan and …
Did Patch Tuesday address the zero-day flaw in Microsoft Exchange
Threat Level Vulnerability Report For a detailed threat advisory, download the pdf file here Summary Microsoft addresses two new zero-day vulnerabilities tracked under CVE-2022-41033, an Elevation of Privilege vulnerability exploited in the wild. CVE-2022-41043 is an Information Disclosure vulnerability was publicly disclosed. Microsoft has not released …
The surge of cryptojacking campaigns
Threat Level Attack Report For a detailed threat advisory, download the pdf file here Summary Recent cryptojacking campaigns disclosed that intruders exploited DLL Side-Loading issues in Microsoft OneDrive by writing a fake secur32.dll file to establish persistence and operate undetected on compromised systems. …
POLONIUM employs backdoors to target Israel
Threat Level Actor Report For a detailed threat advisory, download the pdf file here Summary POLONIUM is a cyber espionage gang that leverages OneDrive and Dropbox cloud services for command and control (C&C) by employing a custom toolkit that includes seven backdoors and various spying modules …
Zero-Day Remote Code Execution Vulnerability in Zimbra Collaboration Suite
Threat Level Vulnerability Report For a detailed threat advisory, download the pdf file here Summary The active exploitation of an unpatched CVE-2022-41352 remote code execution (RCE) vulnerability found in the Zimbra Collaboration Suite (ZCS). It empowers attackers to upload arbitrary files and execute malicious operations on …
Vulnerability in Fortinet allows authentication bypass
Threat Level Vulnerability Report For a detailed threat advisory, download the pdf file here Summary FortiOS, FortiProxy, and FortiSwitchManager has an authentication bypass vulnerability, CVE-2022-40684, that could allow remote attackers access to the administrative interface and take control of the entire network …
Eternity Threat group is actively evolving its malware arsenal
Threat Level Attack Report For a detailed threat advisory, download the pdf file here Summary The Eternity threat group (also known as Eternity Team or Eternity Project), a Russian “Jester Group”-affiliated threat group, has been active since at least January 2022. Eternity uses a malware-as-a-service subscription …