ioc.one
Open in
urlscan Pro
95.216.115.177
Public Scan
Submitted URL: http://ioc.one/
Effective URL: https://ioc.one/
Submission: On September 11 via manual from FO — Scanned from FI
Effective URL: https://ioc.one/
Submission: On September 11 via manual from FO — Scanned from FI
Form analysis
0 forms found in the DOMText Content
Search * Database * Urls * Websites * PDFs * Filter * Misp Threat Cluster * MISP Tags * Hints * Extracted * Attributes * Yara rules * Statistic * Overview * Full Time * Last 30 Days * Last 7 Days * Last 24 Hours * Configuration * Last Updated Website * Last Updated Pdf * RSS Feed Manager * CTI Provider Manager * Log Manager * API Feedback * Sign in with OSINT Cyber Threat Intelligence Database 11.09.2024 | prsol.cc マイクロソフト、2024年9月のパッチ・チューズデーで4件のゼロデイと79件の欠陥を修正 - PRSOL:CC .crit { font-weight:bold; color:red; } .article_section td { font-size: 14px!important;}。本日は、マイクロソフトの9月2024日パッチ・チューズデーであり、積極的に悪用されている4件の脆弱性と公表されている1件のゼロデイを含む79件の脆弱性に対するセキュリティ更新が含まれている。 今回のパッチ・チューズデーでは、リモートでコードが実行されたり、特権が昇格されたりする7件の重大な脆弱性が修正された。 各脆弱性カテゴリーにおけるバグの数は以下の通り: 特権昇格の脆弱性 30件 4 セキュリティ機能迂回の脆弱性… Details & Relations Graph Source 11.09.2024 | thehackernews.com MICROSOFT ISSUES PATCHES FOR 79 FLAWS, INCLUDING 3 ACTIVELY EXPLOITED WINDOWS FLAWS Microsoft’s September 2024 Patch Tuesday fixes 79 security vulnerabilities, including three actively exploited Windows flaws. Details & Relations Graph Source 11.09.2024 | thehackernews.com IVANTI RELEASES URGENT SECURITY UPDATES FOR ENDPOINT MANAGER VULNERABILITIES Ivanti releases critical security updates for Endpoint Manager, addressing remote code execution vulnerabilities. Users urged to update immediately. Details & Relations Graph Source 11.09.2024 | prsol.cc NONAMEランサムウェアの一団、最近の攻撃でRANSOMHUBマルウェアを展開 - PRSOL:CC NoNameランサムウェア・ギャングは、暗号化ツールを使って世界中の中小企業をターゲットに3年以上にわたって評判を高めようとしており、現在はRansomHubのアフィリエイトとして活動している可能性がある。 このギャング団は、Spacecolonマルウェア・ファミリーとして知られるカスタム・ツールを使用し、ブルートフォース手法でネットワークにアクセスした後、EternalBlue(CVE-2017-0144)やZeroLogon(CVE-2020-1472)のような古い脆弱性を悪用して展開します。 最近の攻撃では、NoNameはScarab暗号化ツールに取って代わるScRansomランサムウ… Details & Relations Graph Source 11.09.2024 | securityaffairs.com IVANTI FIXED A MAXIMUM SEVERITY FLAW IN ITS EPM SOFTWARE Ivanti fixed a maximum severity flaw in its EPM software that can let attackers achieve remote code execution on the core server. Details & Relations Graph Source 11.09.2024 | thecyberexpress.com MICROSOFT SEPTEMBER 2024 PATCH TUESDAY: ADDRESSING 79 NEW VULNERABILITIES AND PRODUCT UPDATES The second Tuesday of September has once again proven to be a significant date for cybersecurity with Microsoft’s latest Patch Details & Relations Graph Source 11.09.2024 | infosecurity-magazine.com MICROSOFT FIXES FOUR ACTIVELY EXPLOITED ZERO-DAYS September’s Patch Tuesday fix-list features scores of CVEs including four zero-day vulnerabilities Details & Relations Graph Source 11.09.2024 | redpacketsecurity.com IVANTI RELEASES URGENT SECURITY UPDATES FOR ENDPOINT MANAGER VULNERABILITIES - REDPACKET SECURITY Ivanti has released software updates to address multiple security flaws impacting Endpoint Manager (EPM), including 10 critical vulnerabilities that could Details & Relations Graph Source 11.09.2024 | redpacketsecurity.com MICROSOFT ISSUES PATCHES FOR 79 FLAWS, INCLUDING 3 ACTIVELY EXPLOITED WINDOWS FLAWS - REDPACKET SECURITY Microsoft on Tuesday disclosed that three new security flaws impacting the Windows platform have come under active exploitation as part of its Patch Tuesday Details & Relations Graph Source 11.09.2024 | securityaffairs.com MICROSOFT PATCH TUESDAY SECURITY UPDATES FOR SEPTEMBER 2024 ADDRESSED FOUR ACTIVELY EXPLOITED ZERO-DAYS Microsoft Patch Tuesday security updates for September 2024 addressed 79 flaws, including four actively exploited zero-day flaws. Details & Relations Graph Source 11.09.2024 | medium.com SEPTEMBER 2024 : MICROSOFT PATCH TUESDAY SUMMARY. Includes 4 ACTIVELY-EXPLOITED 0-day flaws Details & Relations Graph Source 11.09.2024 | redpacketsecurity.com MICROSOFT MONTHLY SECURITY UPDATE (SEPTEMBER 2024) - REDPACKET SECURITY Microsoft has released monthly security update for their products: Details & Relations Graph Source 11.09.2024 | medium.com MICROSOFT SEPTEMBER 2024 PATCH TUESDAY FIXES 4 ZERO-DAYS, 79 FLAWS Today is Microsoft’s September 2024 Patch Tuesday, which includes security updates for 79 flaws, including four actively exploited and one… Details & Relations Graph Source 11.09.2024 | malware.news 2024-09-10 KIMSUKY (NORTH KOREAN APT) SAMPLE (SAKAI @SAKAIJJAN - TERMS AND CONDITIONS.MSC) 2024-09-10 Sakai @sakaijjang 김수키(Kimsuky) 에서 만든 악성코드-Terms and conditions(이용 약관).msc(2024.9.6) - Kimsuky (North Korea) - Terms and Conditions.msc by https://x.com/sakaijjang?lang=en Article translation in English More about Kimsuky: 2020-10-27 CISA North Korean Advanced Persistent Threat Focu… Details & Relations Graph Source 11.09.2024 | redpacketsecurity.com CISA: CISA RELEASES FOUR INDUSTRIAL CONTROL SYSTEMS ADVISORIES - REDPACKET SECURITY CISA Releases Four Industrial Control Systems Advisories Details & Relations Graph Source 11.09.2024 | ahnlab.com MS FAMILY SEPTEMBER 2024 ROUTINE SECURITY UPDATE ADVISORY - ASEC Overview Microsoft(https://www.microsoft.com) has released a security update that fixes vulnerabilities in products it has supplied. Users of affected products are advised to update to the latest version. Affected Products Azure Product line Azure CycleCloud 8.0.0 Azure CycleCloud 8.0.1 Azu… Details & Relations Graph Source 11.09.2024 | ahnlab.com MS 제품군 2024년 9월 정기 보안 업데이트 권고 - ASEC 개요 Microsoft (https://www.microsoft.com) 에서는 공급한 제품의 취약점을 해결하는 보안 업데이트를 발표하였습니다. 해당하는 제품 사용자는 최신 버전으로 업데이트하시기 바랍니다. 대상 제품 Azure 제품군 Azure CycleCloud 8.0.0 Azure CycleCloud 8.0.1 Azure CycleCloud 8.0.2 Azure CycleCloud 8.1.0 Azure CycleCloud 8.1.1 Azure CycleCloud 8.2.0 Azure CycleCloud 8.2.… Details & Relations Graph Source 11.09.2024 | ahnlab.com SIEMENS PRODUCT SECURITY UPDATE ADVISORY - ASEC Overview An update has been released to address vulnerabilities in Siemens Products. Users of the affected versions are advised to update to the latest version. Affected Products CVE-2024-37990 SIMATIC Reader RF610R CMIIT versions: ~ 4.2 (excluded) SIMATIC Reader RF610R ETSI versions: ~ 4.2 (ex… Details & Relations Graph Source 11.09.2024 | anquanke.com CISA 确认 SONICWALL 漏洞正在被利用 (CVE-2024-40766)-安全客 - 安全资讯平台 安全客 - 安全资讯平台 Details & Relations Graph Source 11.09.2024 | anquanke.com 美国 CISA 将 SONICWALL SONICOS、IMAGEMAGICK 和 LINUX 内核漏洞添加到其已知已利用漏洞目录中-安全客 - 安全资讯平台 安全客 - 安全资讯平台 Details & Relations Graph Source 11.09.2024 | anquanke.com 微软修复了 4 个被利用的零日漏洞和一个导致早期安全修复失效的代码漏洞-安全客 - 安全资讯平台 安全客 - 安全资讯平台 Details & Relations Graph Source 11.09.2024 | anquanke.com PREDATOR 间谍软件更新了危险新功能,升级版更加难以追踪-安全客 - 安全资讯平台 安全客 - 安全资讯平台 Details & Relations Graph Source 11.09.2024 | google.com INSIGHTS ON CYBER THREATS TARGETING USERS AND ENTERPRISES IN MEXICO | GOOGLE CLOUD BLOG Mexico faces a cyber threat landscape made up of a complex interplay of global and local threats. Details & Relations Graph Source 11.09.2024 | ahnlab.com SIEMENS 제품 보안 업데이트 권고 - ASEC 개요 Siemens 제품에서 발생하는 취약점을 해결하는 업데이트를 발표하였습니다. 해당하는 버전의 사용자는 최신 버전으로 업데이트하시기 바랍니다. 대상 제품 CVE-2024-37990 SIMATIC Reader RF610R CMIIT 버전: ~ 4.2(제외) SIMATIC Reader RF610R ETSI 버전: ~ 4.2(제외) SIMATIC Reader RF610R FCC 버전: ~ 4.2(제외) SIMATIC Reader RF615R CMIIT 버전: ~ 4.2(제외) SIMATIC Reader RF615R ETSI … Details & Relations Graph Source 11.09.2024 | aqniu.com 《电子政务电子认证服务管理办法》发布;京东、淘宝等62款APP完成个人信息收集使用合规整改 | 牛览 - 安全牛 安全牛 Details & Relations Graph Source 10.09.2024 | qualys.com MICROSOFT PATCH TUESDAY, SEPTEMBER 2024 SECURITY UPDATE REVIEW – QUALYS THREATPROTECT Details & Relations Graph Source 10.09.2024 | tistory.com 김수키(KIMSUKY) 에서 만든 악성코드-TERMS AND CONDITIONS(이용 약관).MSC(2024.9.6) 오늘은 김수키(Kimsuky) 에서 만든 악성코드-Terms and conditions.msc에 대해 알아보겠습니다. 일단 해당 악성코드 해쉬값은 다음과 같습니다. 파일명:Terms and conditions.msc 사이즈:141 KB MD5:81d224649328a61c899be9403d1de92d SHA-1:f4895809cb38fa1f225340e99c05e477a5017111 SHA-256:cea22277e0d7fe38a3755bdb8baa9fe203bd54ad4d79c7068116f15a50711b09 해당 악성코드는 T… Details & Relations Graph Source 10.09.2024 | redpacketsecurity.com CISA: CISA ADDS FOUR KNOWN EXPLOITED VULNERABILITIES TO CATALOG - REDPACKET SECURITY CISA Adds Four Known Exploited Vulnerabilities to Catalog Details & Relations Graph Source 10.09.2024 | thehackernews.com COSMICBEETLE DEPLOYS CUSTOM SCRANSOM RANSOMWARE, PARTNERING WITH RANSOMHUB Discover how CosmicBeetle's new ScRansom ransomware targets SMBs globally, its evolution from Scarab, and the latest cybersecurity threats facing busi Details & Relations Graph Source 10.09.2024 | rapid7.com PATCH TUESDAY - SEPTEMBER 2024 | RAPID7 BLOG Details & Relations Graph Source 10.09.2024 | malware.news FOUR ZERO-DAYS INCLUDED IN GROUP OF 79 VULNERABILITIES MICROSOFT DISCLOSES, INCLUDING ONE WITH 9.8 SEVERITY SCORE Microsoft disclosed four vulnerabilities that are actively being exploited in the wild as part of its regular Patch Tuesday security update this week in what’s become a regular occurrence for the company’s patches in 2024. Two of the zero-day vulnerabilities, CVE-2024-38226 and CVE-2024-38014, exi… Details & Relations Graph Source 10.09.2024 | redpacketsecurity.com COSMICBEETLE DEPLOYS CUSTOM SCRANSOM RANSOMWARE, PARTNERING WITH RANSOMHUB - REDPACKET SECURITY The threat actor known as CosmicBeetle has debuted a new custom ransomware strain called ScRansom in attacks targeting small- and medium-sized businesses Details & Relations Graph Source 10.09.2024 | securityboulevard.com PATCH TUESDAY UPDATE - SEPTEMBER 2024 The post Patch Tuesday Update - September 2024 appeared first on Digital Defense. Details & Relations Graph Source 10.09.2024 | malware.news INSIGHTS ON CYBER THREATS TARGETING USERS AND ENTERPRISES IN MEXICO Written by: Aurora Blum, Kelli Vanderlee Like many countries across the globe, Mexico faces a cyber threat landscape made up of a complex interplay of global and local threats, with threat actors carrying out attempted intrusions into critical sectors of Mexican society. Mexico also faces threats… Details & Relations Graph Source 10.09.2024 | thehackernews.com EXPERTS IDENTIFY 3 CHINESE-LINKED CLUSTERS BEHIND CYBERATTACKS IN SOUTHEAST ASIA Chinese-linked cyber espionage targets Southeast Asian governments, using sophisticated malware to infiltrate and steal sensitive data. Details & Relations Graph Source 10.09.2024 | redpacketsecurity.com EXPERTS IDENTIFY 3 CHINESE-LINKED CLUSTERS BEHIND CYBERATTACKS IN SOUTHEAST ASIA - REDPACKET SECURITY A trio of threat activity clusters linked to China has been observed compromising more government organizations in Southeast Asia as part of a renewed Details & Relations Graph Source 10.09.2024 | domaintools.com RETAIL TARGETED CAMPAIGNS—DOMAIN FRAUD, BRAND IMPERSONATION, AND PONZI SCHEMES, OH MY! - DOMAINTOOLS | START HERE. KNOW NOW. DomainTools highlights several ways threat actors seek to take advantage of the retail cybersecurity landscape and aid in understanding how such activity can be enumerated and “clustered” to help organizations defend themselves. Details & Relations Graph Source 10.09.2024 | talosintelligence.com FOUR ZERO-DAYS INCLUDED IN GROUP OF 79 VULNERABILITIES MICROSOFT DISCLOSES, INCLUDING ONE WITH 9.8 SEVERITY SCORE September’s monthly round of patches from Microsoft included 79 vulnerabilities, seven of which are considered critical. Details & Relations Graph Source 10.09.2024 | medium.com CYBER BRIEFING: 2024.09.10 👉 What’s the latest in the cyber world today? Details & Relations Graph Source 10.09.2024 | tenable.com MICROSOFT’S SEPTEMBER 2024 PATCH TUESDAY ADDRESSES 79 CVES (CVE-2024-43491) Microsoft addresses 79 CVEs with seven critical vulnerabilities and four zero-day vulnerabilities, including three that were exploited in the wild. Details & Relations Graph Source 10.09.2024 | gbhackers.com CHINESE HACKERS USING OPEN SOURCE TOOLS LIKE NMAP TO LAUNCH CYBER ATTACKS Three Chinese state-backed threat groups, APT10, GALLIUM, and Stately Taurus, have repeatedly employed a modified version of the open-source Details & Relations Graph Source 10.09.2024 | threatdown.com RANSOMWARE GANGS TARGET SONICWALL VULNERABILITY SonicWall is urging customers affected by CVE-2024-40766 to “please apply the patch as soon as possible.”… Details & Relations Graph Source 10.09.2024 | malware.news SANITIZE YOUR C++ CONTAINERS: ASAN ANNOTATIONS STEP-BY-STEP By Dominik Klemba and Dominik Czarnota AddressSanitizer (ASan) is a compiler plugin that helps detect memory errors like buffer overflows or use-after-frees. In this post, we explain how to equip your C++ code with ASan annotations to find more bugs. We also show our work on ASan in GCC and LLVM. … Details & Relations Graph Source 10.09.2024 | malware.news THERE’S SOMETHING ABOUT CRYPTBOT: YET ANOTHER SILLY STEALER (YASS) Recently Intezer was investigating a file that we came across during alert triage. This particular file piqued our interest due to the interesting delivery chain, and the even more interesting payload, an intricate infostealer. Intezer has amazing code genetic analysis technology, showing us overl… Details & Relations Graph Source 10.09.2024 | socradar.io DARK WEB PROFILE: GLORYSEC - SOCRADAR® CYBER INTELLIGENCE INC. GlorySec is a hacktivist group that has quickly gained notoriety for targeting governments and institutions it deems corrupt, particularly in Russia and Details & Relations Graph Source 10.09.2024 | intezer.com THERE'S SOMETHING ABOUT CRYPTBOT: YET ANOTHER SILLY STEALER (YASS) Recently Intezer was investigating a file that we came across during alert triage. This particular file piqued our interest due to the interesting delivery chain, and the even more interesting payload, an intricate infostealer. Intezer has amazing code genetic analysis technology, showing us overla… Details & Relations Graph Source 10.09.2024 | thezdi.com ZERO DAY INITIATIVE — THE SEPTEMBER 2024 SECURITY UPDATE REVIEW We’ve reached September and the pumpkin spice floats in the air. While they aren’t pumpkin-spiced, Microsoft and Adobe have released their latest spicy security patches – including some zesty 0-days. Take a break from your regular activities and join us as we review the details of their latest secur Details & Relations Graph Source 10.09.2024 | malware.news FAKE RECRUITER CODING TESTS TARGET DEVS WITH MALICIOUS PYTHON PACKAGES ReversingLabs researchers have identified new, malicious software packages believe to be linked to a campaign, VMConnect, that our team first identified in August 2023 and which has ties to the North Korean hacking team Lazarus Group. The new samples were tracked to GitHub projects that have been l… Details & Relations Graph Source 10.09.2024 | sosintel.co.uk WEEKLY NEWS ROUNDUP - SOS INTELLIGENCE In August, cybersecurity researchers at Proofpoint discovered a novel malware campaign, nicknamed "Voldemort," that exploits Google Sheets. Details & Relations Graph Source 10.09.2024 | cyble.com CISA ADDS THREE CRITICAL VULNERABILITIES TO KNOWN EXPLOITED VULNERABILITIES CATALOG - CYBLE The Cybersecurity and Infrastructure Security Agency (CISA) KEV Catalog adds CVE-2016-3714, CVE-2017-1000253, and CVE-2024-40766. Details & Relations Graph Source 10.09.2024 | sophos.com CRIMSON PALACE RETURNS: NEW TOOLS, TACTICS, AND TARGETS Chinese cyberespionage campaign renews efforts in multiple organization in Southeast Asia, blending tactics and expanding efforts Details & Relations Graph Source 10.09.2024 | paloaltonetworks.com THREAT ASSESSMENT: REPELLENT SCORPIUS, DISTRIBUTORS OF CICADA3301 RANSOMWARE Repellent Scorpius distributes Cicada3301 ransomware, using double extortion and targeting global victims since May 2024. We break down their toolset and more. Repellent Scorpius distributes Cicada3301 ransomware, using double extortion and targeting global victims since May 2024. We break down the… Details & Relations Graph Source 10.09.2024 | gbhackers.com CISA ISSUES WARNING ABOUT THREE ACTIVELY EXPLOITED VULNERABILITIES IN THE WILD CISAs Warning Vulnerabilities affect a range of widely used software and systems, posing risks to organizations and individuals alike. Details & Relations Graph Source 10.09.2024 | infosecurity-magazine.com CRITICAL SONICWALL SSLVPN BUG EXPLOITED BY RANSOMWARE ACTORS Researchers have warned that a critical SonicWall vulnerability is being exploited in ransomware attacks Details & Relations Graph Source 10.09.2024 | securityboulevard.com FAKE RECRUITER CODING TESTS TARGET DEVS WITH MALICIOUS PYTHON PACKAGES ReversingLabs researchers have identified new, malicious software packages believe to be linked to a campaign, VMConnect, that our team first identified in August 2023 and which has ties to the North Korean hacking team Lazarus Group. The new samples were tracked to GitHub projects that have been l… Details & Relations Graph Source 10.09.2024 | securityaffairs.com U.S. CISA ADDS SONICWALL SONICOS, IMAGEMAGICK AND LINUX KERNEL BUGS TO ITS KNOWN EXPLOITED VULNERABILITIES CATALOG U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds SonicWall SonicOS, ImageMagick and Linux Kernel bugs to its Known Exploited Vulnerabilities catalog. Details & Relations Graph Source 10.09.2024 | redpacketsecurity.com CHROMEOS MULTIPLE VULNERABILITIES - REDPACKET SECURITY Multiple vulnerabilities were identified in ChromeOS. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, Details & Relations Graph Source 10.09.2024 | checkpoint.com AUGUST 2024’S MOST WANTED MALWARE: RANSOMHUB REIGNS SUPREME WHILE MEOW RANSOMWARE SURGES - CHECK POINT BLOG Check Point’s latest threat index reveals RansomHub's continued dominance and Meow ransomware's rise with novel tactics and significant impact. Check Details & Relations Graph Source 10.09.2024 | malware.news THREAT HUNTING CASE STUDY: UNCOVERING FIN7 FIN7 is one of the most persistent and capable financially motivated threat actor groups. Here’s how to threat hunt for signs of a FIN7 intrusion. Article Link: https://intel471.com/blog/threat-hunting-case-study-uncovering-fin7 Details & Relations Graph Source 10.09.2024 | redpacketsecurity.com CISA: CISA ADDS THREE KNOWN EXPLOITED VULNERABILITIES TO CATALOG - REDPACKET SECURITY CISA Adds Three Known Exploited Vulnerabilities to Catalog Details & Relations Graph Source 10.09.2024 | tistory.com 부고 알림으로 위장 하고 있는 피싱 사이트-U2(.)TO/F4BHFOJ(2024.9.6) 오늘도 멀쩡하게 살아계시는 부모님이 돌아가셨다고 해서 부고 문자 돌리는 스미싱에 대해 알아보겠습니다.존경하신 아버님께서 오랫동안 투병하시다 별세하셨음을 안애드립니다. 장례식장[부고]아버님께서 숙환으로 금일 별세하셨기에 삼가 알려 드립니다 선생님께서 숙환으로 1월11일 새벽2시 별세하셨기에 삼가 알려드립니다. 시간 장소사랑하는 부친께서 금일 별세하였기에 삼가 알려듭립니다.장례식장喪報 (상보)발인:05월2일[노환으로]아버님께 별세하셨기에 알립니다. 주소:[Web발신] 쓰레기무단투기 신고접수 되었습니다. 내용확인:[Web발신] 폐기물무… Details & Relations Graph Source 10.09.2024 | cisecurity.org MULTIPLE VULNERABILITIES IN IVANTI PRODUCTS COULD ALLOW FOR REMOTE CODE EXECUTION <p>Multiple vulnerabilities have been discovered in Ivanti products, the most severe of which could allow for remote code execution. </p> <ul> <li>Ivanti Endpoint Manager is a client-based unified endpoint management software.</li> <li>Ivanti Cloud Service Appliance (CSA) is an Internet appliance t… Details & Relations Graph Source 10.09.2024 | anquanke.com 黑客利用 GEOSERVER 漏洞植入后门和僵尸网络恶意软件-安全客 - 安全资讯平台 安全客 - 安全资讯平台 Details & Relations Graph Source 10.09.2024 | bleepingcomputer.com NONAME RANSOMWARE GANG DEPLOYING RANSOMHUB MALWARE IN RECENT ATTACKS The NoName ransomware gang has been trying to build a reputation for more than three years targeting small and medium-sized businesses worldwide with its encryptors and may now be working as a RansomHub affiliate. Details & Relations Graph Source 10.09.2024 | cisecurity.org MULTIPLE VULNERABILITIES IN ADOBE PRODUCTS COULD ALLOW FOR ARBITRARY CODE EXECUTION <p>Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution.</p> <ul> <li>Adobe is a software that is used for creating and publishing a wide variety of contents including graphics, photography, illustration, animation, multi… Details & Relations Graph Source 10.09.2024 | malware.news BUG LEFT SOME WINDOWS PCS DANGEROUSLY UNPATCHED – KREBS ON SECURITY Details & Relations Graph Source 10.09.2024 | zscaler.com ZSCALER PROTECTS AGAINST 6 NEW VULNERABILITIES FOR WINDOWS Zscaler has proactively deployed protection for the following 6 vulnerabilities included in the September 2024 Microso Details & Relations Graph Source 10.09.2024 | anquanke.com BLIND EAGLE 威胁组织利用定制 QUASAR RAT 攻击哥伦比亚保险业-安全客 - 安全资讯平台 安全客 - 安全资讯平台 Details & Relations Graph Source 10.09.2024 | reversinglabs.com FAKE RECRUITER CODING TESTS TARGET DEVS WITH MALICIOUS PYTHON PACKAGES RL found the VMConnect campaign continuing with malicious actors posing as recruiters, using packages and the names of financial firms to lure developers. Details & Relations Graph Source 10.09.2024 | bleepingcomputer.com MICROSOFT SEPTEMBER 2024 PATCH TUESDAY FIXES 4 ZERO-DAYS, 79 FLAWS Today is Microsoft's September 2024 Patch Tuesday, which includes security updates for 79 flaws, including four actively exploited and one publicly disclosed zero-days. Details & Relations Graph Source 10.09.2024 | anquanke.com AKIRA 勒索软件行为者利用 SONICWALL 漏洞实现远程代码执行-安全客 - 安全资讯平台 安全客 - 安全资讯平台 Details & Relations Graph Source 10.09.2024 | bankinfosecurity.com GERMAN CYBER AGENCY INVESTIGATING APT28 PHISHING CAMPAIGN The German cyber agency is reportedly investigating a phishing campaign tied to Russian state hacking group APT28 that used a bogus website mimicking an influential Details & Relations Graph Source 10.09.2024 | bleepingcomputer.com IVANTI FIXES MAXIMUM SEVERITY RCE BUG IN ENDPOINT MANAGEMENT SOFTWARE Ivanti has fixed a maximum severity vulnerability in its Endpoint Management software (EPM) that can let unauthenticated attackers gain remote code execution on the core server. Details & Relations Graph Source 10.09.2024 | ssi.gouv.fr MULTIPLES VULNÉRABILITÉS DANS LES PRODUITS SIEMENS - CERT-FR Details & Relations Graph Source 10.09.2024 | ssi.gouv.fr MULTIPLES VULNÉRABILITÉS DANS LES PRODUITS OWNCLOUD - CERT-FR Details & Relations Graph Source 10.09.2024 | ssi.gouv.fr MULTIPLES VULNÉRABILITÉS DANS LES PRODUITS SAP - CERT-FR Details & Relations Graph Source 10.09.2024 | cyberscoop.com HERE’S WHAT MICROSOFT FIXED IN SEPTEMBER’S PATCH TUESDAY Three of those vulnerabilities — CVE-2024-38014, CVE-2024-38217, CVE-2024-38226 — have been exploited in the wild. Details & Relations Graph Source 10.09.2024 | intel471.com THREAT HUNTING CASE STUDY: UNCOVERING FIN7 FIN7 is one of the most persistent and capable financially motivated threat actor groups. Here's how to threat hunt for signs of a FIN7 intrusion. Details & Relations Graph Source 10.09.2024 | sans.edu MICROSOFT SEPTEMBER 2024 PATCH TUESDAY - SANS INTERNET STORM CENTER Microsoft September 2024 Patch Tuesday, Author: Johannes Ullrich Details & Relations Graph Source 10.09.2024 | welivesecurity.com COSMICBEETLE STEPS UP: PROBATION PERIOD AT RANSOMHUB ESET researchers examine the recent activities of the CosmicBeetle threat actor, documentingt its new ScRansom ransomware and highlighting connections to other well-established ransomware gangs. Details & Relations Graph Source 10.09.2024 | ahnlab.com IBM 제품 보안 업데이트 권고 - ASEC 개요 IBM 제품에서 발생하는 취약점을 해결하는 업데이트를 발표하였습니다. 해당하는 버전의 사용자는 최신 버전으로 업데이트하시기 바랍니다. 대상 제품 CVE-2024-40681 IBM MQ Operator 버전: 2.0.26 IBM MQ Operator 버전: 3.2.4 CVE-2024-45076, CVE-2024-45075 IBM webMethods Integration 버전: 10.15 해결된 취약점 특별히 정의된 역할에 속한 인증된 사용자가 보안 제한을 우회하고 큐 관리자에 대한 작업을 […] Details & Relations Graph Source 10.09.2024 | ssi.gouv.fr MULTIPLES VULNÉRABILITÉS DANS MOODLE - CERT-FR Details & Relations Graph Source 10.09.2024 | eclecticiq.com RANSOMWARE IN THE CLOUD: SCATTERED SPIDER TARGETING INSURANCE AND FINANCIAL INDUSTRIES EclecticIQ analysts discovered ransomware operations by SCATTERED SPIDER targeting cloud infrastructures within the insurance and financial sectors. Details & Relations Graph Source 09.09.2024 | redpacketsecurity.com US-CERT VULNERABILITY SUMMARY FOR THE WEEK OF SEPTEMBER 2, 2024 - REDPACKET SECURITY Bulletins provide weekly summaries of new vulnerabilities. Patch information is provided when available. Details & Relations Graph Source 09.09.2024 | medium.com DIVE INTO SIGMA CORRELATION RULES And go hunting for Cicada3301 ransomware behaviors in the process Details & Relations Graph Source 09.09.2024 | paloaltonetworks.com THREAT ASSESSMENT: NORTH KOREAN THREAT GROUPS Explore Unit 42's review of North Korean APT groups and their impact, detailing the top 10 malware and tools we've seen from these threat actors. Explore Unit 42's review of North Korean APT groups and their impact, detailing the top 10 malware and tools we've seen from these threat actors. Details & Relations Graph Source 09.09.2024 | threatdown.com NEW RANSOMHUB ATTACK USES TDSKILLER AND LAZAGNE, DISABLES EDR - THREATDOWN BY MALWAREBYTES The attack signals a new shift in RansomHub’s arsenal of tools. Details & Relations Graph Source 09.09.2024 | thehackernews.com BLIND EAGLE TARGETS COLOMBIAN INSURANCE SECTOR WITH CUSTOMIZED QUASAR RAT Blind Eagle APT group targets Colombian insurance sector with custom Quasar RAT, using phishing emails and Google Drive to spread malware. Details & Relations Graph Source 09.09.2024 | thehackernews.com CHINESE HACKERS EXPLOIT VISUAL STUDIO CODE IN SOUTHEAST ASIAN CYBERATTACKS Chinese hackers exploit Visual Studio Code in cyberattacks on Southeast Asian governments. New technique uses reverse shell for espionage and data the Details & Relations Graph Source 09.09.2024 | redpacketsecurity.com BLIND EAGLE TARGETS COLOMBIAN INSURANCE SECTOR WITH CUSTOMIZED QUASAR RAT - REDPACKET SECURITY The Colombian insurance sector is the target of a threat actor tracked as Blind Eagle with the end goal of delivering a customized version of a known Details & Relations Graph Source 09.09.2024 | redpacketsecurity.com CHINESE HACKERS EXPLOIT VISUAL STUDIO CODE IN SOUTHEAST ASIAN CYBERATTACKS - REDPACKET SECURITY The China-linked advanced persistent threat (APT) group known as Mustang Panda has been observed weaponizing Visual Studio Code software as part of espionage Details & Relations Graph Source 09.09.2024 | medium.com STRENGTHENING CYBER DEFENSES: NEW POLICIES, VULNERABILITIES, AND HIGH-PROFILE CYBERATTACKS SIGNAL… More from the Author: LinkedIn Details & Relations Graph Source 09.09.2024 | gbhackers.com AKIRA RANSOMWARE ACTIVELY EXPLOITING SONICWALL FIREWALL RCE VULNERABILITY SonicWall disclosed a critical remote code execution vulnerability (CVE-2024-40766) in SonicOS on August 22nd, 2024. While no active Details & Relations Graph Source 09.09.2024 | socradar.io AKIRA RANSOMWARE TARGETS SONICWALL VULNERABILITY (CVE-2024-40766) – IMMEDIATE PATCHING REQUIRED - SOCRADAR® CYBER INTELLIGENCE INC. A recently patched SonicWall vulnerability, CVE-2024-40766, has been found to affect the SSLVPN feature of SonicWall firewalls in addition to management Details & Relations Graph Source 09.09.2024 | rapid7.com MULTIPLE VULNERABILITIES IN VEEAM BACKUP & REPLICATION | RAPID7 BLOG Details & Relations Graph Source 09.09.2024 | malware.news 9TH SEPTEMBER – THREAT INTELLIGENCE REPORT For the latest discoveries in cyber research for the week of 9th September, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES The German air traffic control agency, Deutsche Flugsicherung, has confirmed a cyberattack that impacted its administrative IT infrastructure. Th… Details & Relations Graph Source 09.09.2024 | checkpoint.com 9TH SEPTEMBER – THREAT INTELLIGENCE REPORT - CHECK POINT RESEARCH For the latest discoveries in cyber research for the week of 9th September, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES The German air traffic control agency, Deutsche Flugsicherung, has confirmed a cyberattack that impacted its administrative IT infrastructure. The e… Details & Relations Graph Source 09.09.2024 | sekoia.io A GLIMPSE INTO THE QUAD7 OPERATORS' NEXT MOVES AND ASSOCIATED BOTNETS Uncover the secrets of the Quad7 botnet and its ever-evolving toolset. Learn about the new backdoors and protocols used by these operators. Details & Relations Graph Source 09.09.2024 | thehackernews.com U.S. OFFERS $10 MILLION FOR INFO ON RUSSIAN CADET BLIZZARD HACKERS BEHIND MAJOR ATTACKS Russian hackers from GRU’s Unit 29155 linked to global cyberattacks on critical infrastructure, espionage, and sabotage since 2020. Details & Relations Graph Source 09.09.2024 | securelist.ru НОВАЯ ВЕРСИЯ БЭКДОРА LOKI ДЛЯ ФРЕЙМВОРКА MYTHIC АТАКУЕТ РОССИЙСКИЕ КОМПАНИИ Эксперты «Лаборатории Касперского» обнаружили новую версию агента Loki для фреймворка с открытым кодом Mythic, которая использует DLL-библиотеки в атаках на российские компании. Details & Relations Graph Source THIS WEBSITE USES COOKIES This page uses cookies for traffic analysis and to understand user interactions. Data about your use is shared with analytics partners for enhanced service. By using this site, you consent to our cookie policy. OK | Imprint