Case Study

secret of system32

Secret of System32

The Windows operating system, a cornerstone of personal and professional computing, is underpinned by a myriad of critical files that ensure its seamless operation. Central to this intricate web of files is the System32 directory, a vital component that houses essential system files and libraries. While many users might never interact directly with this directory, …

Secret of System32 Read More »

Threat Intel Roundup: CoinEx, Azure Dataleak, Kafka, Lumma

Threat Intel Roundup: CoinEx, Azure Dataleak, Kafka, Lumma

Week in Overview(14 Sep-19 Sep) Technical Summary Silent Skimmer Campaign CVE-2023-34040 – Spring Kafka Deserialization RCE Vulnerability North Korean Lazarus Group’s Involvement in Cryptocurrency Hacks Microsoft AI Data Exposure of 38 Terabytes Exploitation of “search-ms” URI Protocol Handler Distributing XWorm Malware Lumma Stealer Malware Variant (14.09) Detection and Mitigation Key Findings it is crucial for …

Threat Intel Roundup: CoinEx, Azure Dataleak, Kafka, Lumma Read More »

Pi-hole Attack Surface

Pi-hole Attack Surface EBook

A network-wide ad-blocking tool with the capability to execute arbitrary commands. Executive Summary Path Traversal to RCE via teleporter.php and zip_file Parameter: The teleporter.php script in Pi-hole and zip_file parameter, which handles the import and export of settings, contains a vulnerability in its file upload functionality. The application does not adequately validate the contents and …

Pi-hole Attack Surface EBook Read More »

Threat Intel Roundup: XWiki, cl0p, HTML Sumggling

Threat Intel Roundup: XWiki, cl0p, HTML Smuggling

XWiki Remote Code Execution (CVE-2023-35150) The XWiki vulnerability (CVE-2023-35150) involves improper input validation within the “Invitation Application.” Authenticated attackers can exploit this flaw by manipulating requests, leading to arbitrary code execution. XWiki’s scripting feature, used to create web applications, includes an “Invitation Application” facilitating email notifications for user registration. The vulnerability arises when unvalidated user …

Threat Intel Roundup: XWiki, cl0p, HTML Smuggling Read More »

Threat Intel Roundup: Winrar, Discord, USDC Holdings

Threat Intel Roundup: Winrar, Discord, USDC Holdings

Technical Summary WinRAR CVE-2023-40477 RCE CVE-2023-40477 is a Remote Code Execution (RCE) vulnerability in WinRAR, a popular Windows file archiver utility. This high-severity flaw is attributed to inadequate validation of user-supplied data in the processing of recovery volumes. Attackers exploit this vulnerability by crafting specially designed RAR archive files. When a victim opens the malicious …

Threat Intel Roundup: Winrar, Discord, USDC Holdings Read More »

Unveiling the Art of Face Generation

Unveiling the Art of Face Generation (EBook)

Welcome to a captivating journey into the fascinating realm of face generation, where artistry, innovation, and practicality converge in the world of Open Source Intelligence (OSINT). In an era defined by rapid technological advancements and the relentless expansion of digital footprints, the ability to manipulate and generate facial images has emerged as a dynamic tool …

Unveiling the Art of Face Generation (EBook) Read More »

Barracuda Web Security Gateway Security Risks

Barracuda Web Security Gateway Security Risks Ebook

This executive summary outlines the recently identified vulnerabilities within the Barracuda Web Security Gateway, specifically relating to Insecure Direct Object References (IDOR) and LDAP Injection. The vulnerabilities have been assessed for their potential impact on the security posture of organizations using the Barracuda Web Security Gateway and provide recommendations for mitigation. Vulnerability Overview: Potential Impact: …

Barracuda Web Security Gateway Security Risks Ebook Read More »

Threat Intel Roundup: Exchange, LOCKBIT, TA558, GhostRAT

Threatradar Week in Overview

Threat Intel Roundup: Exchange, LOCKBIT, TA558, GhostRAT Technical Summary Vulnerabilities in CODESYS V3 SDK Could Lead to OT Environments Being Exploited Using RCE & DoS Attacks: Multiple high-severity vulnerabilities have been identified within the CODESYS V3 software development kit (SDK), used to program programmable logic controllers (PLCs). These vulnerabilities affect versions prior to 3.5.19.0. Exploitation …

Threatradar Week in Overview Read More »

Free Consultation

For a Free Consultation And Analysis Of Your Business, Please Fill Out The Opposite Form, Our Team Will Contact You As Soon As Possible.