Threat Intel Roundup: CoinEx, Azure Dataleak, Kafka, Lumma

Threat Intel Roundup: CoinEx, Azure Dataleak, Kafka, Lumma

Week in Overview(14 Sep-19 Sep) Technical Summary Silent Skimmer Campaign CVE-2023-34040 – Spring Kafka Deserialization RCE Vulnerability North Korean Lazarus Group’s Involvement in Cryptocurrency Hacks Microsoft AI Data Exposure of 38 Terabytes Exploitation of “search-ms” URI Protocol Handler Distributing XWorm

Read More
Pi-hole Attack Surface

Pi-hole Attack Surface EBook

A network-wide ad-blocking tool with the capability to execute arbitrary commands. Executive Summary Path Traversal to RCE via teleporter.php and zip_file Parameter: The teleporter.php script in Pi-hole and zip_file parameter, which handles the import and export of settings, contains a

Read More
Pi-hole Attack Surface

Pi-hole Attack Surface

A network-wide ad-blocking tool with the capability to execute arbitrary commands. Executive Summary Path Traversal to RCE via teleporter.php and zip_file Parameter: The teleporter.php script in Pi-hole and zip_file parameter, which handles the import and export of settings, contains a

Read More
Threat Intel Roundup: Lazarus, Lumma, Superset, RocketMQ

Threat Intel Roundup: Lazarus, Lumma, Superset, RocketMQ

Week in Overview(5 Sep-12 Sep) Technical Summary Key Findings it is crucial for organizations and individuals to prioritize remediation and patching efforts to safeguard their systems and data. The following key findings highlight the importance of proactive measures to mitigate

Read More

Rocket.Chat IOS Application (EBook)

A modern iOS application that exposes your account token and runs arbitrary commands. Executive Summary Exposed API Key in GET URL (/api/v1/users.info?userId): RTLO Character Injection in Chat:

Read More

What Is Rocket.Chat For IOS Application?

In our digital-first era, the dynamic cybersecurity landscape evolves with new threats and vulnerabilities daily. It’s a race between security professionals and cyber adversaries. Two vulnerabilities that have recently emerged concern exposed API keys in URLs and the malicious use of Right-to-Left Override (RTLO) character injections in chat platforms. This article dives deep into understanding these vulnerabilities, their implications, and the best practices to remediate them.

Read More
Threat Intel Roundup: QakBot, Ignition, RICHIESTA DI PAGAMENTO

Threat Intel Roundup: QakBot, Ignition, RICHIESTA DI PAGAMENTO

Week in Overview(28 Aug-5 Sep) Technical Summary Apache Ignition Unauthenticated Remote Code Execution Vulnerability CVE-2023-37895 Apache Jackrabbit RMI #RCE Exploitation of MinIO Storage System Vulnerabilities Phishing Campaign Targeting Italian Audience – RICHIESTA DI PAGAMENTO 04/09/2023 QakBot Takedown – Bot Connections

Read More
REDMINE Attack Surface

REDMINE Attack Surface

In the rapidly evolving landscape of cybersecurity, understanding the nuances of various vulnerabilities becomes paramount. Two potent threats have been making headlines recently: Cross-Site Scripting (XSS) and CSV Injection. Both exploits differ in their methodologies but share a common objective — compromise system integrity and data security. This article offers insights into these vulnerabilities, their impacts, and the pressing need for robust cybersecurity measures.

Read More
Threat Intel Roundup: XWiki, cl0p, HTML Sumggling

Threat Intel Roundup: XWiki, cl0p, HTML Smuggling

XWiki Remote Code Execution (CVE-2023-35150) The XWiki vulnerability (CVE-2023-35150) involves improper input validation within the “Invitation Application.” Authenticated attackers can exploit this flaw by manipulating requests, leading to arbitrary code execution. XWiki’s scripting feature, used to create web applications, includes

Read More
Threat Intel Roundup: Winrar, Discord, USDC Holdings

Threat Intel Roundup: Winrar, Discord, USDC Holdings

Technical Summary WinRAR CVE-2023-40477 RCE CVE-2023-40477 is a Remote Code Execution (RCE) vulnerability in WinRAR, a popular Windows file archiver utility. This high-severity flaw is attributed to inadequate validation of user-supplied data in the processing of recovery volumes. Attackers exploit

Read More
Unveiling the Art of Face Generation

Unveiling the Art of Face Generation (EBook)

Welcome to a captivating journey into the fascinating realm of face generation, where artistry, innovation, and practicality converge in the world of Open Source Intelligence (OSINT). In an era defined by rapid technological advancements and the relentless expansion of digital

Read More

Free Consultation

For a Free Consultation And Analysis Of Your Business, Please Fill Out The Opposite Form, Our Team Will Contact You As Soon As Possible.