Summary: This article discusses multiple critical vulnerabilities in Emerson devices that expose them to cyberattacks.

Threat Actor: N/A Victim: Emerson devices

Key Point :

Multiple critical vulnerabilities have been discovered in Emerson devices, putting them at risk of cyberattacks.

Endpoint Security , Governance & Risk Management , Internet of Things Security

Critical-Severity Flaws Expose Emerson Devices to Cyberattacks Prajeet Nair (@prajeetspeaks) • June 28, 2024    

Image: Shutterstock

Multiple critical vulnerabilities in Emerson gas chromatographs could allow malicious actors access to sensitive data, cause denial-of-service conditions and execute arbitrary commands.…

Read More

Summary: Juniper Networks has released an emergency update to address a maximum severity vulnerability that leads to authentication bypass in Session Smart Router (SSR), Session Smart Conductor, and WAN Assurance Router products.

Threat Actor: N/A

Victim: Juniper Networks

Key Point :

Juniper Networks has released an emergency update to address an authentication bypass vulnerability in their Session Smart Router (SSR), Session Smart Conductor, and WAN Assurance Router products.…
Read More

Summary: The content discusses the vulnerabilities in 5G technologies that put mobile devices at risk of data theft and denial of service attacks.

Threat Actor: Hackers

Victim: Mobile device users

Key Point:

Hackers can exploit vulnerabilities in 5G technologies to provide users with their internet connection, allowing them to spy, phish, and carry out other malicious activities.…
Read More

IntelBroker, a notorious figure known for orchestrating high-profile cyberattacks, operates within BreachForums. Specializing in identifying and selling access to compromised systems, sensitive data leaks, and possibly extortion, IntelBroker facilitates various malicious activities.

Most known profile picture of IntelBroker

BreachForums, IntelBroker’s long-time base, was recently taken down once again in an operation.…

Read More

We analyze the multi-stage loading technique used by Water Sigbin to deliver the PureCrypter loader and XMRIG crypto miner.

SummaryWater Sigbin continues to exploit CVE-2017-3506 and CVE-2023-21839 to deploy  cryptocurrency miners via a PowerShell script. The threat actor employs fileless execution techniques, using DLL reflective and process injection, allowing the malware code to run solely in memory and avoid disk-based detection mechanisms.…
Read More

Summary: The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added three known exploited vulnerabilities to its catalog, including a code injection flaw in GeoServer and a use-after-free vulnerability in the Linux Kernel.

Threat Actor: N/A Victim: N/A

Key Point :

The GeoServer flaw (CVE-2022-24816) allows for remote code execution through code injection in the Jai-Ext open source project.…
Read More

Summary: This content discusses a critical SQL injection vulnerability in Fortra FileCatalyst Workflow (CVE-2024-5276) and the availability of a proof-of-concept exploit online.

Threat Actor: N/A

Victim: Enterprise admins using Fortra FileCatalyst Workflow

Key Point:

A critical SQL injection vulnerability (CVE-2024-5276) has been discovered in the Workflow component of Fortra FileCatalyst.…
Read More

Summary: A novel malware strain called Snowblind is targeting banking customers in Southeast Asia, using a technique that disables Android banking apps’ ability to detect malicious modifications, leading to financial losses and fraud.

Threat Actor: Snowblind | Snowblind Victim: Banking customers in Southeast Asia | banking customers in Southeast Asia

Key Point :

The newly discovered malware strain, Snowblind, is targeting banking customers in Southeast Asia.…
Read More

Summary: This content discusses multiple vulnerabilities in ADOdb, a PHP database abstraction layer library, and emphasizes the importance of updating the library to mitigate potential security risks.

Threat Actor: N/A

Victim: N/A

Key Point :

Multiple vulnerabilities have been addressed in ADOdb, including SQL injection attacks, cross-site scripting (XSS) attacks, and authentication bypasses.…
Read More
Executive Summary

In this article, Unit 42 researchers detail recent findings of malicious Cobalt Strike infrastructure. We also share examples of malicious Cobalt Strike samples that use Malleable C2 configuration profiles derived from the same profile hosted on a public code repository.

Cobalt Strike is a commercial software framework that enables security professionals like red team members to simulate attackers embedding themselves in a network environment.…

Read More

Summary: Apple has released a firmware update for AirPods to address an authentication issue that could allow unauthorized access to the headphones, potentially enabling eavesdropping on private conversations.

Threat Actor: N/A

Victim: AirPods users

Key Point :

An authentication issue in AirPods could allow a malicious actor to gain unauthorized access to the headphones.…
Read More