feedly.com
Open in
urlscan Pro
104.20.59.241
Public Scan
URL:
https://feedly.com/i/subscription/feed/https://community.qualys.com/blogs/securitylabs/feeds/posts
Submission: On August 22 via api from IL — Scanned from DE
Submission: On August 22 via api from IL — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Skip to Content VULNERABILITIES AND THREAT RESEARCH – QUALYS SECURITY BLOG EXPERT NETWORK SECURITY GUIDANCE AND NEWS 15K followers1 article per week#security#threat-research#tech MOST POPULAR Atlassian Confluence: Questions for Confluence App Hardcoded Credentials Vulnerability (CVE-2022-26138) by Mayank Deshmukh / 5d Over the last few months, Atlassian Confluence has increasingly become a target for attackers. In June 2022, a critical severity OGNL Remote Code Execution vulnerability was disclosed (CVE-2022-26134). More recently, CVE-2022-26138 was disclosed on social media platforms in July 2022. In CVE-2022-26138, a Confluence user account is created by the Questions for Confluence app with hardcoded creden Russia-Ukraine Crisis: How to Strengthen Your Security Posture to Protect against Cyber Attack, based on CISA Guidelines 34by Nagi Prabhu / 5mo CISA has created Shields Up as a response to the Russian invasion of Ukraine. Qualys is responding with additional security, monitoring and governance measures. This blog details how and what our enterprise customers can do to immediately strengthen their security posture and meet CISA’s recommendations. With the invasion of Ukraine by Russia, the U.S. Cybersecurity & Infrastructure Security Agen Infographic: Log4Shell Vulnerability Impact by the Numbers by Qualys Research Team / 5mo The full scope of risk presented by the Log4Shell vulnerability is something unprecedented, spanning every type of organization across every industry. Hard to find but easy to exploit, Log4Shell immediately places hundreds of millions of Java-based applications, databases, and devices at risk. Remediating this vulnerability has turned out not to be a simple, one-and-done process. Multiple detecti AUG 16 AsyncRAT C2 Framework: Overview, Technical Analysis & Detection by Pawan Kumar N / 5d In this blog we describe the AsyncRAT C2 ( command & control ) Framework, which allows attackers to remotely monitor and control other computers over a secure encrypted link. We provide an overview of this threat, a technical analysis, and a method of detecting the malware using Qualys Multi-Vector EDR . What is AsyncRAT C2 Framework? AsyncRAT C2 Framework is a Remote Access Trojan (RAT) designed AUG 09 August 2022 Patch Tuesday | Microsoft Releases 121 Vulnerabilities with 17 Critical, plus 20 Microsoft Edge (Chromium-Based); Adobe Releases 5 Advisories, 25 Vulnerabilities with 15 Critical. PatchTuesday • by Debra M. Fezza Reed / 12d Microsoft Patch Tuesday Summary Microsoft has fixed 121 vulnerabilities (aka flaws) in the August 2022 update, including 17 vulnerabilities classified as Critical as they allow Elevation of Privilege (EoP) and Remote Code Execution (RCE). This month’s Patch Tuesday fixes two (2) zero-day vulnerabilities, with one (1) actively exploited in attacks ( CVE-2022-34713 , CVE-2022-30134 ). Earlier this AUG 01 Here’s a Simple Script to Detect the Stealthy Nation-State BPFDoor by Harshal Tupsamudre / 20d In this blog, the Qualys Research Team explains the mechanics of a Linux malware variant named BPFdoor. We then demonstrate the efficacy of Qualys Custom Assessment and Remediation to detect it, and Qualys Multi-Vector EDR to protect against it. BPFDoor is a Linux/Unix backdoor that allows threat actors to remotely connect to a Linux shell to gain complete access to a compromised device. It suppo JUL 29 New Qualys Research Report: Evolution of Quasar RAT by Viren Chaudhari / 23d The Qualys Threat Research Team continues to inform enterprise cybersecurity teams of emerging threats that could impact their business. These threat intelligence reports summarize individual threat exploits and provide practical recommendations for protecting against them. In this free research report , we analyze Quasar RAT which has been widely leveraged by multiple threat actor groups targeti JUL 12 July 2022 Patch Tuesday | Microsoft Releases 84 Vulnerabilities with 4 Critical, plus 2 Microsoft Edge (Chromium-Based); Adobe Releases 4 Advisories, 27 Vulnerabilities with 18 Critical. by Debra M. Fezza Reed / 40d Microsoft Patch Tuesday Summary Microsoft has fixed 84 vulnerabilities (aka flaws) in the July 2022 update, including four (4) vulnerabilities classified as Critical as they allow Remote Code Execution (RCE). This month’s Patch Tuesday cumulative Windows update includes the fix for one (1) actively exploited zero-day vulnerability ( CVE-2022-22047 ). Earlier this month, July 6, 2022, Microsoft al JUN 29 Atlassian Confluence OGNL Injection Remote Code Execution (RCE) Vulnerability (CVE-2022-26134) by Mayank Deshmukh / 53d On June 02, 2022, Atlassian published a security advisory about a critical severity Unauthenticated Remote Code Execution vulnerability affecting Confluence Server and Data Center. According to the advisory, the vulnerability is being actively exploited and Confluence Server and Data Center versions after 1.3.0 are affected. The vulnerability is tracked as CVE-2022-26134 with 9.8 CVSSv3 score wit JUN 21 Defending Against Scheduled Task Attacks in Windows Environments by Harshal Tupsamudre / 2mo Scheduling tasks is one of the most popular attack techniques used by threat actors to establish persistence on a victim’s machine. The Qualys Research Team investigated different ways that attackers could use to conceal scheduled tasks. In this blog, we describe three new techniques to hide and delete scheduled tasks in a Microsoft Windows environment. Adversaries abuse task scheduling functiona JUN 15 New Qualys Research Report: Inside a Redline InfoStealer Campaign by Akshat Pradhan / 2mo The Qualys Threat Research Team continues its efforts to identify and document previously unseen adversary activity to better understand their tactics, techniques, and procedures (TTPs) and defend against them. Recently we identified a new Redline InfoStealer campaign that spreads via fake cracked software hosted on Discord’s content delivery network. The campaign was actively observed from the e JUN 14 June 2022 Patch Tuesday | Microsoft Releases 55 Vulnerabilities with 3 Critical; Adobe Releases 6 Advisories, 46 Vulnerabilities with 40 Critical. by Debra M. Fezza Reed / 2mo Microsoft Patch Tuesday Summary Microsoft has fixed 55 vulnerabilities (aka flaws) in the June 2022 update, including three (3) vulnerabilities classified as Critical as they allow Remote Code Execution (RCE). This month’s Patch Tuesday cumulative Windows update includes the fix for one (1) zero-day vulnerability ( CVE-2022-30190 ). Microsoft also released an advisory for Intel Processor MMIO Sta MAY 10 May 2022 Patch Tuesday | Microsoft Releases 75 Vulnerabilities with 8 Critical by Debra M. Fezza Reed / 3mo Microsoft Patch Tuesday Summary Microsoft has fixed 75 vulnerabilities in the May 2022 update, including one advisory ( ADV220001 1 ) for Azure in response to CVE-2022-29972 , a publicly exposed Zero-Day Remote Code Execution (RCE) Vulnerability, and eight (8) vulnerabilities classified as Critical as they allow RCE or Elevation of Privileges. This month’s Patch Tuesday release includes fixes for MAY 09 Ursnif Malware Banks on News Events for Phishing Attacks by Amit Gadhave / 3mo Ursnif (aka Gozi, Dreambot, ISFB) is one of the most widespread banking trojans. It has been observed evolving over the past few years. Ursnif has shown incredible theft capabilities. In 2020 Ursnif rose to prominence becoming one of the top ten most prolific pieces of malware. Among its core functionalities are stealing credentials, downloading other malware, working as a keylogger, among others MAY 06 CISA Alert: Top 15 Routinely Exploited Vulnerabilities by Swapnil Ahirrao / 3mo The U.S. Cybersecurity & Infrastructure Security Agency has published its report on the top exploited vulnerabilities of 2021. This blog summarizes the report’s findings and how you can use Qualys VMDR to automatically detect and remediate these risks in your enterprise environment. The Cybersecurity & Infrastructure Security Agency (CISA) releases detailed alerts of critical vulnerabilities and MAY 04 Ransomware Insights from the FBI’s 2021 Internet Crime Report by Swapnil Ahirrao / 3mo The FBI has published its annual report on Internet crime. Qualys has analyzed its trends and statistics. In this post, we review our findings, especially with regards to the prevalence of Ransomware, and our recommendations for actions that enterprises should take to mitigate their risk. Every year the U.S. Federal Bureau of Investigation publishes an Internet crime report which summarizes its i APR 20 Implications of Windows Subsystem for Linux for Adversaries & Defenders (Part 2) by Akshat Pradhan / 4mo This post is the second of a multi-part blog series that explores and highlights the different risks that Windows Subsystem for Linux (WSL) poses to an enterprise IT environment. Here we examine different TTPs that abuse WSL and assess different methods to defend against such threats. ← Go to Part 1 Attack Tactics, Techniques & Procedures Using Windows Subsystem for Linux In our previous blog pos APR 12 April 2022 Patch Tuesday: Microsoft Releases 145 Vulnerabilities with 10 Critical; Adobe Releases 4 Advisories, 78 Vulnerabilities with 51 Critical. by Debra M. Fezza Reed / 4mo Microsoft Patch Tuesday Summary Microsoft has fixed 145 vulnerabilities, including 17 Microsoft Edge vulnerabilities, in the April 2022 update, with ten (10) classified as Critical as they allow Remote Code Execution (RCE). This month’s Patch Tuesday release includes fixes for two (2) zero-day vulnerabilities as well, one (1) known to be actively exploited ( CVE-2022-24521 ) and the other to be p MAR 31 Spring Framework Zero-Day Remote Code Execution (Spring4Shell) Vulnerability by Bharat Jogi / 4mo Update: On March 31, Spring provided official confirmation and CVE-2022-22965 is now assigned to this vulnerability. Qualys Research Team has released QIDs as of March 30 and will keep updating those QIDs as new information is available. On March 30, a new zero-day Remote Code Execution (RCE) vulnerability, “Spring4Shell” or “SpringShell” was disclosed in the Spring framework. An unauthorized att MAR 22 Implications of Windows Subsystem for Linux for Adversaries & Defenders (Part 1) by Akshat Pradhan / 5mo This post is the first of a multi-part blog series that will explore and highlight the different risks that Windows Subsystem for Linux (WSL) poses to an enterprise IT environment. Here we examine a new Microsoft feature for GNU\Linux that increases the attack surface and introduces a lot more complexity to detection. Go to Part 2 → About Windows Subsystem for Linux Windows Subsystem for Linux (W MAR 18 Qualys Study Reveals How Enterprises Responded to Log4Shell by Mehul Revankar / 5mo On December 9, 2021, a critical zero-day vulnerability affecting Apache’s Log4j2 library, a Java-based logging utility, was disclosed to the world. This was no small announcement. As the third most used computer language, Java is practically ubiquitous. Its Log4j2 library is extremely popular. Billions of devices around the globe currently run Java. Most enterprises likely have multiple versions END OF FEED YOU MIGHT ALSO LIKE 360 Netlab Blog - Network Security Research Lab at 360 14K followers AlienVault Labs Blog 16K followers CXSECURITY Database RSS Feed - CXSecurity.com 12K followers Explore READ ALL YOUR FAVORITE SECURITY SOURCES IN ONE PLACE CREATE A FREE FEEDLY ACCOUNT TO KEEP UP WITH THE TOPICS AND TRENDS YOU CARE ABOUT Continue with Google Terms of service