Our news

  • Ivanti Releases Security Updates for Avalanche, Neurons for ITSM, and Virtual Traffic Manager

    Ivanti released security updates to address multiple vulnerabilities in Ivanti Avalanche, Neurons for ITSM, and Virtual Traffic Manager (vTM).  A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system. Ivanti advises users to reduce their attack surface and follow industry best practices by adhering to Ivanti’s network configuration…

    READ MORE

  • CISA Adds Six Known Exploited Vulnerabilities to Catalog

    CISA has added six new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-38189 Microsoft Project Remote Code Execution Vulnerability CVE-2024-38178 Microsoft Windows Scripting Engine Memory Corruption Vulnerability CVE-2024-38213 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability CVE-2024-38193 Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability CVE-2024-38106 Microsoft Windows Kernel Privilege Escalation Vulnerability CVE-2024-38107 Microsoft Windows…

    READ MORE

  • CISA Releases Ten Industrial Control Systems Advisories

    CISA released ten Industrial Control Systems (ICS) advisories on August 13, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-24-226-01 AVEVA SuiteLink Server ICSA-24-226-02 Rockwell Automation AADvance Standalone OPC-DA Server ICSA-24-226-03 Rockwell Automation GuardLogix/ControlLogix 5580 Controller  ICSA-24-226-04 Rockwell Automation Pavilion8 ICSA-24-226-05 Rockwell Automation DataMosaix Private Cloud ICSA-24-226-06 Rockwell…

    READ MORE

  • Is It Safe to Jailbreak ChatGPT? Uncover the Risks and Rewards!

    The term jailbreaking is the process of removing software restrictions or limitations imposed by the manufacturer or developer on a device or system. Most technology users most commonly associate this term with smartphones. In the context of Artificial Intelligence (AI) and large language models (LLM) like ChatGPT, jailbreaking refers to the process of bypassing the…

    READ MORE

  • Vulnerability Summary for the Week of August 5, 2024

    High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info Patch Info 10web–Slider by 10Web Responsive Image Slider  The Slider by 10Web – Responsive Image Slider plugin for WordPress is vulnerable to time-based SQL Injection via the ‘id’ parameter in all versions up to, and including, 1.2.57 due to insufficient escaping on the user…

    READ MORE

  • Best Practices for Cisco Device Configuration

    In recent incidents, CISA has seen malicious cyber actors acquire system configuration files by leveraging available protocols or software on devices, such as abusing the legacy Cisco Smart Install feature. CISA recommends organizations disable Smart Install and review NSA’s Smart Install Protocol Misuse advisory and Network Infrastructure Security Guide for configuration guidance.  CISA also continues…

    READ MORE

  • Royal Ransomware Actors Rebrand as “BlackSuit,” FBI and CISA Release Update to Advisory

    Today, CISA—in partnership with the Federal Bureau of Investigation (FBI)—released an update to joint Cybersecurity Advisory #StopRansomware: Royal Ransomware, #StopRansomware: BlackSuit (Royal) Ransomware. The updated advisory provides network defenders with recent and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) associated with BlackSuit and legacy Royal activity. FBI investigations identified these…

    READ MORE

  • Defending the Edge Podcast, Episode 21: Unveiling the Mask, The Many Faces of Hacking  

    Red hat, blue hat, grey hat, black hat; follow along as we dive into the world of hackers on episode 21 of the Defending the Edge Podcast with DefendEdge set to be released tomorrow, August 6th. Uncover the different veils that make up ethical hackers, state-sponsored hackers, and the many other hats they wear. Topics…

    READ MORE

  • Emerging Threat Review: Storm-0324 & Sangria Tempest 

    The newest set of tactics, techniques, and procedures (TTPs) from Storm-0324, otherwise known as DEV-0324, reveals their use of Microsoft Teams to deliver malware through phishing messages and attachments. With corporate networks within their reach, this new evolution raises concerns for companies utilizing Microsoft Teams for day-to-day communications.   Analysis: A publicly available Python-based tool known as…

    READ MORE

  • Vulnerability Summary for the Week of July 29, 2024

    High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source & Patch Info Apache Software Foundation–Apache SeaTunnel Web  Web Authentication vulnerability in Apache SeaTunnel. Since the jwt key is hardcoded in the application, an attacker can forge any token to log in any user. Attacker can get secret key in /seatunnel-server/seatunnel-app/src/main/resources/application.yml and then create a token. This issue…

    READ MORE