January(137)  February(207)  March(430) April(317) May(278)  June(237)  July(216)  August(316) September(186) October(24) November(114) December(126)

DATE

NAME

INFO

CATEGORY

SUBCATE

28.2.24

Pony

Pony (also known as Fareit or Siplog) is a malware categorized as a loader and stealer, although it is also used as a botnet, being a tool that has been used for more than 10 years and is still in use.

Malware

Stealer

28.2.24

RustDoor

New macOS Backdoor Written in Rust Shows Possible Link with Windows Ransomware Group

Malware

Backdoor

28.2.24

Russian Cyber Actors Use Compromised Routers to
Facilitate Cyber Operation

Actions EdgeRouter network defenders and users should implement to protect against APT28 activity

REPORT

REPORT

28.2.24

TimbreStealer

When Stealers Converge: New Variant of Atomic Stealer in the Wild

Malware

Stealer

28.2.24

Mispadu

According to ESET Research, Mispadu is an ambitious Latin American banking trojan that utilizes McDonald’s malvertising and extends its attack surface to web browsers.

Malware

Banking

28.2.24

Cyclops Blink

Modular malware framework targeting SOHO network devices

Malware

Linux

28.2.24

MASEPIE

Compromised Routers Are Still Leveraged as Malicious Infrastructure to Target Government Organizations in Europe and the Caucasus

Malware

Loader

28.2.24

CVE-2023-23397

Microsoft Outlook Elevation of Privilege Vulnerability

Vulnerebility

CVE

28.2.24

APT29

SVR cyber actors adapt tactics for initial cloud access

APT

APT

28.2.24

CVE-2023-40000

4 Million WordPress Sites affected by Stored Cross-Site Scripting Vulnerability in LiteSpeed Cache Plugin

Vulnerebility

CVE

28.2.24

Nood RAT

Analysis of Nood RAT Used in Attacks Against Linux (Gh0st RAT’s Variant)

Malware

RAT

28.2.24

CVE-2023-4969

A GPU kernel can read sensitive data from another GPU kernel (even from another user or app) through an optimized GPU memory region called _local memory_ on various architectures.

Vulnerebility

CVE

27.2.24

CVE-2024-1071

The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to SQL Injection via the 'sorting' parameter in versions 2.1.3 to 2.8.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.

Vulnerebility

CVE

27.2.24

CVE-2023-3460

The Ultimate Member WordPress plugin before 2.6.7 does not prevent visitors from creating user accounts with arbitrary capabilities, effectively allowing attackers to create administrator accounts at will. This is actively being exploited in the wild.

Vulnerebility

CVE

27.2.24

IDAT Loader

Unveiling UAC-0184: The Steganography Saga of the IDAT Loader Delivering Remcos RAT to a Ukraine Entity in Finland

Malware

Loader

27.2.24

SubdoMailing

“SubdoMailing” — Thousands of Hijacked Major-Brand Subdomains Found Bombarding Users With Millions of Malicious Emails

Spam

SPAM

27.2.24

DarkVNC

DarkVNC is a hidden utility based on the Virtual Network Computing (VNC) technology, initially promoted on an Exploit forum in 2016.

Malware

Stealer

27.2.24

Remcos RAT

We have discovered some of the most dangerous threats and nation state attacks in our space – including the Kaseya MSP breach and the more_eggs malware.

Malware

RAT

27.2.24

DCRat

We have discovered some of the most dangerous threats and nation state attacks in our space – including the Kaseya MSP breach and the more_eggs malware.

Malware

RAT

27.2.24

Ousaban

Ousaban: LATAM Banking Malware Abusing Cloud Services

Malware

Banking

27.2.24

Mekotio

Tweet on recent Mekotio Banker campaign

Malware

Banking

27.2.24

Astaroth

First spotted in the wild in 2017, Astaroth is a highly prevalent, information-stealing Latin American banking trojan. It is written in Delphi and has some innovative execution and attack techniques.

Malware

Banking

25.2.24

WEBIGniter v28.7.23 - Stored Cross Site Scripting (XSS)

PHP

Exploit

WebApps

25.2.24

JFrog Artifactory < 7.25.4 - Blind SQL Injection

PHP

Exploit

WebApps

25.2.24

Wondercms 4.3.2 - XSS to RCE

Multiple

Exploit

WebApps

25.2.24

SureMDM On-premise < 6.31 - CAPTCHA Bypass User Enumeration

Multiple

Exploit

WebApps

25.2.24

Employee Management System v1 - 'email' SQL Injection

PHP

Exploit

WebApps

25.2.24

Microsoft Windows Defender - VBScript Detection Bypass

Windows_x86-64

Exploit

Local

25.2.24

Microsoft Windows Defender Bypass - Detection Mitigation Bypass

Windows_x86-64

Exploit

Local

25.2.24

XAMPP - Buffer Overflow POC

Windows

Exploit

DoS

25.2.24

phpFox < 4.8.13 - (redirect) PHP Object Injection Exploit

PHP

Exploit

WebApps

25.2.24

DS Wireless Communication - Remote Code Execution

Hardware

Exploit

Local

25.2.24

Metabase 0.46.6 - Pre-Auth Remote Code Execution

Linux

Exploit

WebApps

25.2.24

SISQUALWFM 7.1.319.103 - Host Header Injection

Multiple

Exploit

WebApps

25.2.24

Lost and Found Information System v1.0 - ( IDOR ) leads to Account Take over

PHP

Exploit

WebApps

25.2.24

ManageEngine ADManager Plus Build < 7183 - Recovery Password Disclosure

Windows

Exploit

WebApps

25.2.24

VIMESA VHF/FM Transmitter Blue Plus 9.7.1 (doreboot) - Remote Denial Of Service

Hardware

Exploit

DoS

25.2.24

Splunk 9.0.4 - Information Disclosure

Multiple

Exploit

WebApps

25.2.24

LockBit Attempts to Stay Afloat With a New Version

This research is the result of our collaboration with the National Crime Agency in the United Kingdom, who took action against LockBit as part of Operation Cronos, an international effort resulting in the undermining of its operations.

Ransomware

Ransomware

23.2.24

CVE-2024-23204 

The issue was addressed with additional permissions checks. This issue is fixed in macOS Sonoma 14.3, watchOS 10.3, iOS 17.3 and iPadOS 17.3. A shortcut may be able to use sensitive data with certain actions without prompting the user.

Vulnerebility

CVE

23.2.24

PQ3

iMessage with PQ3: The new state of the art in quantum-secure messaging at scale

Crypto

Crypto

22.2.24

SSH-Snake

SSH-Snake: New Self-Modifying Worm Threatens Networks

Malware

Worm

22.2.24

KONNI

To Russia With Love: Assessing a KONNI-Backdoored Suspected Russian Consular Software Installer

Malware

RAT

22.2.24

CVE-2023-52161

The Access Point functionality in eapol_auth_key_handle in eapol.c in iNet wireless daemon (IWD) before 2.14 allows attackers to gain unauthorized access to a protected Wi-Fi network. An attacker can complete the EAPOL handshake by skipping Msg2/4 and instead sending Msg4/4 with an all-zero key.

Vulnerebility

CVE

22.2.24

CVE-2023-52160 

The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication.

Vulnerebility

CVE

21.2.24

PlugX

Mustang Panda’s PlugX new variant targetting Taiwanese government and diplomats

Malware

Stealer

21.2.24

SMUGX

CHINESE THREAT ACTORS TARGETING EUROPE IN SMUGX CAMPAIGN

Campaign

Campaign

21.2.24

Operation Texonto

Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war

Operation

Operation

21.2.24

VietCredCare

Extra credit: VietCredCare information stealer takes aim at Vietnamese businesses

Malware

Stealer

21.2.24

Earth Preta

Earth Preta Campaign Uses DOPLUGS to Target Asia

Campaign

Campaign

21.2.24

CVE-2024-22250

Session Hijack vulnerability in Deprecated VMware Enhanced Authentication Plug-in could allow a malicious actor with unprivileged local access to a windows operating system can hijack a privileged EAP session when initiated by a privileged domain user on the same system.

Vulnerebility

CVE

21.2.24

CVE-2024-22245

Arbitrary Authentication Relay and Session Hijack vulnerabilities in the deprecated VMware Enhanced Authentication Plug-in (EAP) could allow a malicious actor that could trick a target domain user with EAP installed in their web browser into requesting and relaying service tickets for arbitrary Active Directory Service Principal Names (SPNs).

Vulnerebility

CVE

21.2.24

Migo

Migo - a Redis Miner with Novel System Weakening Techniques

Malware

Miner

21.2.24

SysJoker

Sysjoker is a backdoor malware that was first discovered in December 2021 by Intezer.

Malware

Backdoor

21.2.24

BiBi-Linux

According to Security Joes, this malware is an x64 ELF executable, lacking obfuscation or protective measures. It allows attackers to specify target folders and can potentially destroy an entire operating system if run with root permissions.

Malware

Wipper

21.2.24

Tool of First Resort

Israel-Hamas War in Cyber

REPORT

REPORT

21.2.24

CVE-2024-25600

CVE-2024-25600 (CVSS score: 9.8), enables unauthenticated attackers to achieve remote code execution. It impacts all versions of the Bricks up to and including 1.9.6.

Vulnerebility

CVE

19.2.24

Anatsa 

Anatsa Trojan Returns: Targeting Europe and Expanding Its Reach

Malware

Android

19.2.24

TAG-70

Russia-Aligned TAG-70 Targets European Government and Military Mail Servers in New Espionage Campaign

Group

Group

19.2.24

BASICSTAR

Through its managed security services offerings, Volexity routinely identifies spear-phishing campaigns targeting its customers.

Malware

Backdoor

18.2.24

Raccoon Stealer v2

Raccoon Stealer v2 – Part 1: The return of the dead

Malware

Stealer

18.2.24

Recordbreaker

An info stealer is malicious software (malware) that seeks to steal private data from a compromised device, including passwords, cookies, autofill information from browsers, and cryptocurrency wallet information.

Malware

Stealer

17.2.24

DeliveryCheck

According to CERT-UA, this malware makes use of XSLT (Extensible Stylesheet Language Transformations) and COM-hijacking. Its specificity is the presence of a server part, which is usually installed on compromised MS Exchange servers in the form of a MOF (Managed Object Format) file using the Desired State Configuration (DCS) PowerShell tool), effectively turning a legitimate server into a malware control center.

Malware

Backdoor

17.2.24

TinyTurla-NG

TinyTurla Next Generation - Turla APT spies on Polish NGOs

Malware

Backdoor

17.2.24

FLATLINED

FLATLINED: ANALYZING PULSE SECURE FIRMWARE AND BYPASSING INTEGRITY CHECKING

Vulnerebility

CVE

17.2.24

GoldDigger

Group-IB uncovers the first iOS Trojan harvesting facial recognition data used for unauthorized access to bank accounts. The GoldDigger family grows

Malware

iOS

17.2.24

Bumblebee

This malware is delivered by an ISO file, with an DLL inside with a custom loader. Because of the unique user-agent "bumblebee" this malware was dubbed BUMBLEBEE. At the time of Analysis by Google's Threat Analysis Group (TAG) BumbleBee was observed to fetch Cobalt Strike Payloads.

Malware

Loader

17.2.24

Water Hydra

Water Hydra’s Zero-Day Attack Chain Targets Financial Traders

APT

APT

17.2.24

CVE-2024-21412

Internet Shortcut Files Security Feature Bypass Vulnerability

Vulnerebility

CVE

17.2.24

DarkMe

CVE-2024-21412: Water Hydra Targets Traders With Microsoft Defender SmartScreen Zero-Day

Malware

Loader

17.2.24

CVE-2024-20684

(CVSS score: 6.5) - Windows Hyper-V Denial of Service Vulnerability

Vulnerebility

CVE

17.2.24

CVE-2024-21357 

(CVSS score: 7.5) - Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability

Vulnerebility

CVE

17.2.24

CVE-2024-21380

(CVSS score: 8.0) - Microsoft Dynamics Business Central/NAV Information Disclosure Vulnerability

Vulnerebility

CVE

17.2.24

CVE-2024-21410

(CVSS score: 9.8) - Microsoft Exchange Server Elevation of Privilege Vulnerability

Vulnerebility

CVE

17.2.24

CVE-2024-21413 

(CVSS score: 9.8) - Microsoft Outlook Remote Code Execution Vulnerability

Vulnerebility

CVE

17.2.24

CVE-2024-21412

(CVSS score: 8.1) - Internet Shortcut Files Security Feature Bypass Vulnerability

Vulnerebility

CVE

17.2.24

CVE-2024-21351 

(CVSS score: 7.6) - Windows SmartScreen Security Feature Bypass Vulnerability

Vulnerebility

CVE

17.2.24

Glupteba

Diving Into Glupteba's UEFI Bootkit

BOTNET

BOTNET

17.2.24

Glupteba

Diving Into Glupteba's UEFI Bootkit

Malware

Bootkit

17.2.24

PikaBot

Pikabot is a malware loader that originally emerged in early 2023. Over the past year, ThreatLabz has been tracking the development of Pikabot and its modus operandi.

Malware

Loader

17.2.24

CVE-2024-21893

A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication.

Vulnerebility

CVE

17.2.24

DSLog

Ivanti Connect Secure: Journey to the core of the DSLog backdoor

Malware

Backdoor

17.2.24

CVE-2023-43770 

Roundcube before 1.4.14, 1.5.x before 1.5.4, and 1.6.x before 1.6.3 allows XSS via text/plain e-mail messages with crafted links because of program/lib/Roundcube/rcube_string_replacer.php behavior.

Vulnerebility

CVE

17.2.24

Akira ransomware

Akira Ransomware and Exploitation of Cisco Anyconnect Vulnerability CVE-2020-3259

Ransomware

Ransomware

17.2.24

CVE-2020-3259 

A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to retrieve memory contents on an affected device, which could lead to the disclosure of confidential information.

Vulnerebility

CVE

17.2.24

RustDoor

New macOS Backdoor Written in Rust Shows Possible Link with Windows Ransomware Group

Malware

macOS

17.2.24

SNS Sender

SNS Sender | Active Campaigns Unleash Messaging Spam Through the Cloud

Campaign

Spam

12.2.24

Rhysida Decryption Tool

Korea Internet & Security Agency (KISA) distribuuje nastroj pro obnovu ransomwaru Rhysida.

Ransomware

Anti-Ransom tool

12.2.24

Warzone RAT

The U.S. Justice Department (DoJ) on Friday announced the seizure of online infrastructure that was used to sell a remote access trojan (RAT) called Warzone RAT.

Malware

RAT

10.2.24

RustDoor

New MacOS Backdoor Written in Rust Shows Possible Link with Windows Ransomware Group

Malware

Backdoor

10.2.24

RASPBERRY ROBIN

RASPBERRY ROBIN KEEPS RIDING THE WAVE OF ENDLESS 1-DAYS

Malware

Worm

10.2.24

Online Nurse Hiring System 1.0 - Time-Based SQL Injection

PHP

Exploit

WebApps

10.2.24

Rail Pass Management System 1.0 - Time-Based SQL Injection

PHP

Exploit

WebApps

10.2.24

Wordpress Seotheme - Remote Code Execution Unauthenticated

PHP

Exploit

WebApps

10.2.24

Wordpress Augmented-Reality - Remote Code Execution Unauthenticated

PHP

Exploit

WebApps

10.2.24

Elasticsearch - StackOverflow DoS

Multiple

Exploit

DoS

10.2.24

Zyxel zysh - Format string

Hardware

Exploit

Remote

10.2.24

Advanced Page Visit Counter 1.0 - Admin+ Stored Cross-Site Scripting (XSS) (Authenticated)

PHP

Exploit

WebApps

10.2.24

Milesight Routers UR5X, UR32L, UR32, UR35, UR41 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption

Hardware

Exploit

Remote

10.2.24

Wordpress 'simple urls' Plugin < 115 - XSS

PHP

Exploit

WebApps

10.2.24

TASKHUB-2.8.8 - XSS-Reflected

PHP

Exploit

WebApps

10.2.24

WhatsUp Gold 2022 (22.1.0 Build 39) - XSS

Multiple

Exploit

WebApps

10.2.24

MISP 2.4.171 - Stored XSS

PHP

Exploit

WebApps

10.2.24

Clinic's Patient Management System 1.0 - Unauthenticated RCE

PHP

Exploit

WebApps

10.2.24

Curfew e-Pass Management System 1.0 - FromDate SQL Injection

PHP

Exploit

WebApps

10.2.24

GYM MS - GYM Management System - Cross Site Scripting (Stored)

PHP

Exploit

WebApps

9.2.24

MoqHao 

MoqHao evolution: New variants start automatically right after installation

Malware

Android

9.2.24

Coyote

Coyote: A multi-stage banking Trojan abusing the Squirrel installer

Malware

Banking

9.2.24

CVE-2024-21762

FortiOS - Out-of-bound Write in sslvpnd

Vulnerebility

CVE

9.2.24

CVE-2024-22024

CVE-2024-22024 (XXE) for Ivanti Connect Secure and Ivanti Policy Secure

Vulnerebility

CVE

9.2.24

Zardoor

New Zardoor backdoor used in long-term cyber espionage operation targeting an Islamic organization

Malware

Backdoor

8.2.24

HijackLoader

HijackLoader Expands Techniques to Improve Defense Evasion

Malware

Loader

8.2.24

Troll Stealer

Kimsuky disguised as a Korean company signed with a valid certificate to distribute Troll Stealer

Malware

Stealer

8.2.24

CVE-2024-22241

Aria Operations for Networks contains a cross site scripting vulnerability. A malicious actor with admin privileges can inject a malicious payload into the login banner and takeover the user account.

Vulnerebility

CVE

8.2.24

CVE-2024-22240 

Aria Operations for Networks contains a local file read vulnerability. A malicious actor with admin privileges may exploit this vulnerability leading to unauthorized access to sensitive information.

Vulnerebility

CVE

8.2.24

CVE-2024-22239

Aria Operations for Networks contains a local privilege escalation vulnerability. A console user with access to Aria Operations for Networks may exploit this vulnerability to escalate privileges to gain regular shell access.

Vulnerebility

CVE

8.2.24

CVE-2024-22238

Aria Operations for Networks contains a cross site scripting vulnerability. A malicious actor with admin privileges may be able to inject malicious code into user profile configurations due to improper input sanitization.

Vulnerebility

CVE

8.2.24

CVE-2024-22237

Aria Operations for Networks contains a local privilege escalation vulnerability. A console user with access to Aria Operations for Networks may exploit this vulnerability to escalate privileges to gain root access to the system.

Vulnerebility

CVE

8.2.24

CVE-2024-23109

An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.1.0 through 7.1.1 and 7.0.0 through 7.0.2 and 6.7.0 through 6.7.8 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.2 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via via crafted API requests.

Vulnerebility

CVE

8.2.24

CVE-2024-23108 

An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.1.0 through 7.1.1 and 7.0.0 through 7.0.2 and 6.7.0 through 6.7.8 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.2 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via via crafted API requests.

Vulnerebility

CVE

8.2.24

CVE-2024-20255

A vulnerability in the SOAP API of Cisco Expressway Series and Cisco TelePresence Video Communication Server could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system.

Vulnerebility

CVE

8.2.24

CVE-2024-20254

Multiple vulnerabilities in Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an unauthenticated, remote attacker to conduct cross-site request forgery (CSRF) attacks that perform arbitrary actions on an affected device.

Vulnerebility

CVE

8.2.24

CVE-2024-20252

Multiple vulnerabilities in Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an unauthenticated, remote attacker to conduct cross-site request forgery (CSRF) attacks that perform arbitrary actions on an affected device.

Vulnerebility

CVE

8.2.24

KV-Botnet

KV-Botnet: Don’t Call It A Comeback

BOTNET

BOTNET

7.2.24

CVE-2023-40546

(CVSS score: 5.3) - Out-of-bounds read when printing error messages, resulting in a denial-of-service (DoS) condition

Vulnerebility

CVE

7.2.24

CVE-2023-40548

(CVSS score: 7.4) - Buffer overflow in shim when compiled for 32-bit processors that can lead to a crash or data integrity issues during the boot phase

Vulnerebility

CVE

7.2.24

CVE-2023-40549

(CVSS score: 5.5) - Out-of-bounds read in the authenticode function that could permit an attacker to trigger a DoS by providing a malformed binary

Vulnerebility

CVE

7.2.24

CVE-2023-40550

(CVSS score: 5.5) - Out-of-bounds read when validating Secure Boot Advanced Targeting (SBAT) information that could result in information disclosure

Vulnerebility

CVE

7.2.24

CVE-2023-40551

(CVSS score: 7.1) - Out-of-bounds read when parsing MZ binaries, leading to a crash or possible exposure of sensitive data

Vulnerebility

CVE

7.2.24

BOLDMOVE

According to Mandiant, this malware family is attributed to potential chinese background and its Linux variant is related to exploitation of Fortinet's SSL-VPN (CVE-2022-42475).

Malware

Backdoor

7.2.24

BOLDMOVE

According to Mandiant, this malware family is attributed to potential chinese background and directly related to observed exploitation of Fortinet's SSL-VPN (CVE-2022-42475). There is also a Windows variant.

Malware

ELF

7.2.24

COATHANGER

Successful exploitation of the flaw paved the way for the deployment of a backdoor dubbed COATHANGER from an actor-controlled server that's designed to grant persistent remote access to the compromised appliances.

Malware

RAT

7.2.24

CVE-2023-40547

A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response.

Vulnerebility

CVE

7.2.24

CVE-2024-23917

In JetBrains TeamCity before 2023.11.3 authentication bypass leading to RCE was possible

Vulnerebility

CVE

6.2.24

CrackedCantil

CrackedCantil: A Malware Symphony Breakdown

Malware

Stealer

6.2.24

Ov3r_Stealer

Facebook Advertising Spreads Novel Malware Variant

Malware

Stealer

6.2.24

CVE-2023-38156

(CVSS score: 7.2) - Azure HDInsight Apache Ambari Java Database Connectivity (JDBC) Injection Elevation of Privilege Vulnerability

Vulnerebility

CVE

6.2.24

CVE-2023-36419

(CVSS score: 8.8) - Azure HDInsight Apache Oozie Workflow Scheduler XML External Entity (XXE) Injection Elevation of Privilege Vulnerability

Vulnerebility

CVE

6.2.24

GambleForce

Analysis of TTPs tied to GambleForce, which carried out SQL injection attacks against companies in the APAC region

Group

Group

6.2.24

CVE-2024-21887

A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.

Vulnerebility

CVE

6.2.24

CVE-2024-21893

A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication.

Vulnerebility

CVE

6.2.24

Epeius

A Spyware Vendor Seemingly Made a Fake WhatsApp to Hack Targets

Malware

Spyware

6.2.24

Skygofree

Skygofree: Following in the footsteps of HackingTeam

Malware

Android

5.2.24

VajraSpy

ESET researchers discovered several Android apps carrying VajraSpy, a RAT used by the Patchwork APT group

Malware

RAT

5.2.24

Pegasus

New spyware attacks exposed: civil society targeted in Jordan

Malware

Spyware

5.2.24

DiceLoader

This report aims to detail the functioning of a malware used by FIN7 since 2021, named DiceLoader (also known Icebot), and to provide a comprehensive approach of the threat by detailing the related Techniques...

Malware

Loader

5.2.24

Phemedrone Stealer

CVE-2023-36025 Exploited for Defense Evasion in Phemedrone Stealer Campaign

Malware

Stealer

5.2.24

Mispadu Stealer

Unit 42 researchers recently discovered activity attributed to Mispadu Stealer, a stealthy infostealer first reported in 2019

Malware

Stealer

5.2.24

CVE-2023-36025

Windows SmartScreen Security Feature Bypass Vulnerability

Vulnerebility

CVE

3.2.24

Cloudflare Breach

Thanksgiving 2023 security incident

Incident

Incident

3.2.24

AnyDesk Incident Response 2-2-2024

Following indications of an incident on some of our systems, we conducted a security audit and found evidence of compromised production systems. We immediately activated a remediation and response plan involving cyber security experts CrowdStrike. The remediation plan has concluded successfully.

Incident

Incident

3.2.24

CVE-2024-23832

Mastodon is a free, open-source social network server based on ActivityPub Mastodon allows configuration of LDAP for authentication.

Vulnerebility

CVE

3.2.24

Juniper-SRX-Firewalls&EX-switches - (PreAuth-RCE) (PoC)

PHP

Exploit

WebApps

3.2.24

Electrolink FM/DAB/TV Transmitter - Pre-Auth MPFS Image Remote Code Execution

Hardware

Exploit

WebApps

3.2.24

Electrolink FM/DAB/TV Transmitter - Unauthenticated Remote DoS

Hardware

Exploit

DoS

3.2.24

Electrolink FM/DAB/TV Transmitter - Remote Authentication Removal

Hardware

Exploit

WebApps

3.2.24

Electrolink FM/DAB/TV Transmitter (Login Cookie) - Authentication Bypass

Hardware

Exploit

WebApps

3.2.24

Electrolink FM/DAB/TV Transmitter (controlloLogin.js) - Credentials Disclosure

Hardware

Exploit

WebApps

3.2.24

Electrolink FM/DAB/TV Transmitter (login.htm/mail.htm) - Credentials Disclosure

Hardware

Exploit

WebApps

3.2.24

TP-LINK TL-WR740N - Multiple HTML Injection

Hardware

Exploit

WebApps

3.2.24

TP-Link TL-WR740N - UnAuthenticated Directory Transversal

Hardware

Exploit

WebApps

3.2.24

PCMan FTP Server 2.0 - 'pwd' Remote Buffer Overflow

Windows

Exploit

Remote

3.2.24

mooSocial 3.1.8 - Cross-Site Scripting (XSS) on User Login Page

PHP

Exploit

WebApps

3.2.24

WebCatalog 48.4 - Arbitrary Protocol Execution

Windows

Exploit

Remote

3.2.24

COLDRIVER

The Coldriver Group, also known as Callisto and SEABORGIUM, is a threat actor known to attack government organizations, think tanks, and journalists in Europe and the Caucasus regions through spearphishing campaigns.

Group

Group

3.2.24

HeadLace

ITG05 operations leverage Israel-Hamas conflict lures to deliver Headlace malware

Malware

Backdoor

3.2.24

CVE-2023-23397

Microsoft Outlook Elevation of Privilege Vulnerability

Vulnerebility

CVE

3.2.24

Shuckworm

Shuckworm: Inside Russia’s Relentless Cyber Campaign Against Ukraine

Group

Group

3.2.24

NTLM Relay Attacks

NTLM relay attacks A dangerous game of hot potato

Attack

Attack

3.2.24

LitterDrifter

Malware Spotlight – Into the Trash: Analyzing LitterDrifter

Group

Group

3.2.24

UAC-0027

UAC-0027 Attack Detection: Hackers Target Ukrainian Organizations Using DIRTYMOE (PURPLEFOX) Malware

Group

Group

3.2.24

DirtyMoe

Securonix Threat Research Security Advisory: Analysis and Detection of STEADY#URSA Attack Campaign Targeting Ukraine Military Dropping New Covert SUBTLE-PAWS PowerShell Backdoor

Malware

Backdoor

2.2.24

RoyalTSX 6.0.1 - RTSZ File Handling Heap Memory Corruption PoC

macOS

Exploit

Remote

2.2.24

Proxmox VE - TOTP Brute Force

Linux

Exploit

Remote

2.2.24

GoAhead Web Server 2.5 - 'goform/formTest' Multiple HTML Injection Vulnerabilities

Multiple

Exploit

WebApps

2.2.24

Grocy <=4.0.2 - CSRF

PHP

Exploit

WebApps

2.2.24

101 News 1.0 - Multiple-SQLi

PHP

Exploit

WebApps

2.2.24

Academy LMS 6.2 - SQL Injection

PHP

Exploit

WebApps

2.2.24

Academy LMS 6.2 - Reflected XSS

PHP

Exploit

WebApps

2.2.24

UNC5221

UNC5221: Unreported and Undetected WIREFIRE Web Shell Variant

Group

CyberSpy

2.2.24

Frog4Shell

Frog4Shell — FritzFrog Botnet Adds One-Days to Its Arsenal

BOTNET

Botnet

2.2.24

BPFdoor

We discuss proof-of-concept rootkits and malware used by cybercriminals in conjunction with Berkeley Packet Filtering (BPF), a piece of technology that allows programs to execute code in the operating systems of popular cloud-computing platforms. We also show how to detect such threats.

Malware

Rootkit

2.2.24

Commando Cat

The Nine Lives of Commando Cat: Analysing a Novel Malware Campaign Targeting Docker

Campaign

Cryptocurrency

2.2.24

Volt Typhoon

[Microsoft] Volt Typhoon, a state-sponsored actor based in China that typically focuses on espionage and information gathering. Microsoft assesses with moderate confidence that this Volt Typhoon campaign is pursuing development of capabilities that could disrupt critical communications infrastructure between the United States and Asia region during future crises.

Group

Group

2.2.24

HeadCrab 2.0

HeadCrab 2.0: Evolving Threat in Redis Malware Landscape

Malware

 

2.2.24

CVE-2024-23222

A type confusion issue was addressed with improved checks. This issue is fixed in tvOS 17.3, iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, iOS 16.7.5 and iPadOS 16.7.5, Safari 17.3, macOS Ventura 13.6.4, macOS Monterey 12.7.3.

Vulnerebility

CVE

2.2.24

CVE-2022-48618

The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.1, watchOS 9.2, iOS 16.2 and iPadOS 16.2, tvOS 16.2.

Vulnerebility

CVE

1.2.24

CVE-2024-23653 

'Leaky Vessels' Cloud Bugs Allow Container Escapes Globally

Vulnerebility

CVE

1.2.24

CVE-2024-23652

BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner.

Vulnerebility

CVE

1.2.24

CVE-2024-23651 

BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner.

Vulnerebility

CVE

1.2.24

CVE-2024-21626

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification.

Vulnerebility

CVE

1.2.24

CVE-2024-21893

A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication.

Vulnerebility

CVE

1.2.24

CVE-2024-21888

A privilege escalation vulnerability in web component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows a user to elevate privileges to that of an administrator.

Vulnerebility

CVE

1.2.24

Telekopye

Telekopye: Hunting Mammoths using Telegram bot

BOTNET

Bot

1.2.24

Scammers Paradise

“Scammers Paradise” —Exploring Telegram’s Dark Markets, Breeding Ground for Modern Phishing Operations

Operation

Phishing

1.2.24

QUIETBOARD

Evolution of UNC4990: Uncovering USB Malware's Hidden Depths

Malware

Python

1.2.24

EMPTYSPACE

Mandiant has observed UNC4990 leverage EMPTYSPACE (also known as VETTA Loader and BrokerLoader), a downloader that can execute any payload served by the command and control (C2) server, and QUIETBOARD, which is a backdoor that was delivered using EMPTYSPACE.

Malware

Backdoor

1.2.24

UNC4990

Evolution of UNC4990: Uncovering USB Malware's Hidden Depths

Group

Group

1.2.24

2023 Adversary Infrastructure Report

2023 Adversary Infrastructure Report

REPORT

Report

1.2.24

KRUSTYLOADER

KRUSTYLOADER - RUST MALWARE LINKED TO IVANTI CONNECTSECURE COMPROMISES

Malware

Loader

1.2.24

CVE-2024-21887

A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.

Vulnerebility

CVE

1.2.24

CVE-2023-46805

An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.

Vulnerebility

CVE

1.2.24

CVE-2023-4911

A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable.

Vulnerebility

CVE

1.2.24

CVE-2023-6780

An integer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions.

Vulnerebility

CVE

1.2.24

CVE-2023-6779

An off-by-one heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library.

Vulnerebility

CVE

1.2.24

CVE-2023-6246

A heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions

Vulnerebility

CVE