Evading Endpoint Detection and Response EDR
Endpoint Detection and Response (EDR) solutions are crucial for modern cybersecurity, enabling quick threat detection and response through extensive telemetry. However, attackers utilize various evasion techniques to bypass these systems, exploiting vulnerabilities in EDR architecture and Windows core files. This guide provides insights into EDR monitoring, evasion methods, and defensive strategies.…
Read More
15K Fortigate Firewall Configs Leaked By Belsen Group: Dumped Using Zero-Day in 2022
A recent leak of over 15,000 Fortigate firewall configurations has raised concerns about the security of devices vulnerable to CVE-2024-55591 and CVE-2022-40684. The threat actor known as “Belsen_Group” is believed to have exploited these vulnerabilities and subsequently leaked the configurations in January 2025. Organizations are urged to check their exposure and take necessary mitigation steps.…
Read More
Strategic Approaches to Threat Detection, Investigation & Response
Summary: The digital era presents both opportunities and challenges, with sophisticated cyber threats like ransomware and phishing campaigns posing significant risks to organizations. Threat Detection, Investigation, and Response (TDIR) has emerged as a vital strategy in modern cybersecurity, integrating advanced technologies and skilled professionals to enhance threat management.…
Read More
Ransomware sanctions, software security among key points in new Biden executive order
Summary: President Joe Biden’s executive order focuses on enhancing federal cybersecurity, addressing cybercrime, and securing commercial software. It aims to make it more difficult and costly for foreign adversaries and ransomware criminals to execute cyberattacks against the U.S. The order outlines nine key initiatives to strengthen America’s digital infrastructure and improve the security of both government and private sector systems.…
Read More
New UEFI Secure Boot Vulnerability Could Allow Attackers to Load Malicious Bootkits
Summary: A recently discovered vulnerability (CVE-2024-7344) in UEFI systems could allow attackers to bypass Secure Boot protections, enabling the execution of untrusted code during system boot. The flaw affects several real-time system recovery software suites and could lead to the deployment of malicious UEFI bootkits. Despite being patched, the incident raises concerns about the security practices of third-party UEFI software vendors.…
Read More
Trusted Apps Sneak a Bug Into the UEFI Boot Process
Summary: A vulnerability in several trusted system recovery programs allows privileged attackers to inject malware into the UEFI startup process. The issue, identified as CVE-2024-7344, arises from the use of a custom loader in the “reloader.efi” file, enabling the loading of unsigned binaries. This flaw poses significant risks, as it can bypass UEFI Secure Boot protections, allowing persistent malware installation.…
Read More
FTC Warns GoDaddy for Inadequate Security Practices in Website Hosting Services
Victim: GoDaddy | GoDaddyPrice: Potential fines of up to $51,744 per violationData: Customer information, including email addresses, private encryption keys, and database credentials

Keypoints :

FTC took action against GoDaddy for inadequate security practices. Multiple breaches occurred between 2019 and 2022, exposing sensitive customer data. GoDaddy failed to implement basic cybersecurity measures, such as MFA and regular software updates.…
Read More
Microsoft January Security Update for High-Risk Vulnerabilities in Multiple Products
Microsoft has released a security update patch addressing 159 vulnerabilities across various products, including critical remote code execution and privilege escalation vulnerabilities. Users are urged to apply these patches promptly to mitigate risks. Affected: Windows, Microsoft Office, Microsoft Visual Studio, Azure, Microsoft Dynamics, Microsoft Edge

Keypoints :

Microsoft released a security update on January 14, fixing 159 vulnerabilities.…
Read More
Securonix Threat Labs 2024 Annual Autonomous Threat Sweeper Intelligence Insights
The 2024 Annual Cyber Threat Report reveals a significant increase in cyber threats, including advanced persistent threats (APTs) and evolving tactics used by attackers. Key incidents include the resurgence of LockBit ransomware, exploitation of vulnerabilities in widely-used technologies, and notable data breaches affecting major organizations. Affected: Ivanti Connect Secure, GlobalProtect, CrowdStrike, Snowflake, Palo Alto Networks

Keypoints :

Emerging threats exploit vulnerabilities in Ivanti Connect Secure and GlobalProtect VPN.…
Read More
SAP fixes critical vulnerabilities in NetWeaver application servers
Summary: SAP has addressed two critical vulnerabilities in its NetWeaver web application server that could lead to privilege escalation and unauthorized access to sensitive information. Alongside these critical fixes, SAP also released patches for 12 additional vulnerabilities rated medium to high severity. The company urges customers to promptly apply these updates to safeguard their SAP environments.…
Read More
CISA: Second BeyondTrust Vulnerability Added to KEV Catalog
Summary: The Cybersecurity and Infrastructure Security Agency (CISA) has urged federal agencies to address a command injection vulnerability, CVE-2024-12686, linked to BeyondTrust’s Remote Support services. This medium-severity flaw was identified following a significant data breach at the US Treasury Department, attributed to the Chinese hacking group Silk Typhoon.…
Read More
Critical SAP Flaws Revealed in Latest Security Patch Day
Summary: SAP has released 14 new security notes addressing critical and high-severity vulnerabilities in its core systems, including NetWeaver and BusinessObjects. Notably, two critical vulnerabilities, CVE-2025-0070 and CVE-2025-0066, pose significant risks, allowing unauthorized access and potential privilege escalation. SAP urges customers to apply the patches promptly to safeguard their systems against potential threats.…
Read More
Unauthenticated Attackers can Exploit Two Junos Vulnerabilities to Cause Crashes
Summary: Juniper Networks has issued advisories for two critical vulnerabilities in their Junos OS and Junos OS Evolved systems, emphasizing the need for prompt patch management. The first vulnerability allows unauthenticated attackers to crash the routing protocol daemon (RPD) via malformed BGP packets, while the second leads to kernel memory exhaustion through crafted IPv6 packets, resulting in denial of service.…
Read More
Nvidia, Zoom, Zyxel Patch High-Severity Vulnerabilities
Summary: Nvidia, Zoom, and Zyxel have released critical patches for multiple high-severity vulnerabilities affecting their products, urging users to update immediately. Nvidia’s vulnerabilities could allow for code execution and privilege escalation, while Zoom’s flaw could enable privilege escalation for authenticated attackers. Zyxel addressed an improper privilege management issue that could allow limited users to gain admin rights on certain devices.…
Read More
Chrome 132 Patches 16 Vulnerabilities
Summary: Google has released Chrome 132, addressing 16 security vulnerabilities, including 13 reported by external researchers. Among these, five high-severity flaws were identified, leading to significant bug bounty rewards for the researchers involved. Users are encouraged to update their browsers promptly to mitigate potential risks.

Threat Actor: N/A | N/A Victim: Google Chrome Users | Google Chrome Users

Keypoints :

Chrome 132 includes 16 security fixes, with five high-severity vulnerabilities addressed.…
Read More
Microsoft Patch Tuesday January 2025 Security Update Review Qualys ThreatPROTECT
January 2025 marks the release of Microsoft’s first Patch Tuesday, addressing 159 vulnerabilities, including 10 critical and 149 important. Among these, eight zero-day vulnerabilities have been patched, with three actively exploited. Key updates include fixes for various Microsoft products, notably in Windows and Microsoft Office. Affected: Microsoft Windows, Microsoft Office, .NET,…
Read More