Security Advisories

Security Advisories


The AhnLab Security Intelligence Center (ASEC) has uncovered a new phishing campaign that utilizes malicious HTML files distributed via email attachments.


The Black Lotus Labs team at Lumen Technologies has identified a highly sophisticated malware platform dubbed Cuttlefish, which specifically targets networking equipment, particularly enterprise-grade small office/home office (SOHO) routers.


The malware targets Windows and Linux systems, including VMware ESXi virtual machines.


Cisco has released security updates to tackle vulnerabilities affecting Cisco IOS XR Software.


Adobe has released security updates to address multiple vulnerabilities affecting Adobe software.


An EDR-disabling tool embedded in device drivers continues to be used by threat actors. This is but one of the many attack vectors that leverage compromised system drivers.


FBI Warns U.S. Healthcare Sector of Targeted BlackCat Ransomware Attacks.


Cisco has disclosed a critical remote code execution (RCE) vulnerability in its Unified Communications Manager (CM) and Contact Center Solutions products.


Attackers exploit weak passwords and bypass security like MFA to sneak into accounts.


A critical Bluetooth flaw has been identified, allowing hackers to compromise Android, Linux, MacOS, and iOS devices, enabling unauthorized takeovers.


The FBI and CISA have issued warnings about attacks against various industry sectors by the Rhysida ransomware group.


Please find the security advisory on Scattered Spider-Social Engineering Attack that uses BlackCat/ALPHV Ransomware.  The approach obtains credentials by using phishing techniques and performs Pushbombing and Subscriber Identity Module (SIM) by installing remote access tools to bypass Multi-Factor Authentication (MFA).


Fortinet has released security updates to tackle vulnerabilities in multiple products.


VMware has released security advisories to tackle vulnerabilities CVE-2023-34048, CVE-2023-34056 affecting VMware vCenter Server and VMware Cloud Foundation.


Cisco disclosed a new high-severity zero-day vulnerability (CVE-2023- 20273) that is actively being exploited to deploy malicious implants on IOS XE devices.


Threat actors abusing LinkedIn’s Smart Links in evasive email phishing attacks.


FBI has warned about a new trend in ransomware attacks where multiple strains are deployed on victim networks to encrypt systems in under two days.


Progress Software shipped patches for critical-level security flaws in its WS_FTP file transfer software.


Snatch Ransomware uses Windows Safe Mode and privileged service to bypass AV tools.


Juniper has released out-ofcycle updates to multiple vulnerabilities in Junos OS. A remote attacker could chain these vulnerabilities to execute malicious code on vulnerable devices.


New Phishing-as-a-Service Platform ‘EvilProxy’ lets attacker bypass Multi-Factor Authentication.


Barracuda, a company that provides network and email security solutions, has informed customers that some of its Email Security Gateways (ESGs) have been compromised by a zero-day vulnerability that has been patched. 


OneNote is making an important change to how it treats embedded files that have dangerous extensions.


Attackers use Adversary-in-The-Middle (AiTM) phishing sites as entry point to further financial fraud.


The Ursnif trojan, also known as Gozi, is one of the most widely spread banking Trojans. It is capable of logging keystrokes, exfiltrating data, as well as tracking the activity of the network and the browser.


This vulnerability allows remote attackers to execute arbitrary code on affected installations of Linux Kernel. Authentication is not required to exploit this vulnerability, but only systems with ksmbd enabled are vulnerable.


In September 2022, Microsoft patched an information disclosure vulnerability in SPNEGO NEGOEX (CVE-2022- 37958). Microsoft has now reclassified the vulnerability as “Critical” severity after it was discovered that the vulnerability could allow attackers to remotely execute code.


A critical zero-day vulnerability was found in multiple versions of Fortinet’s FortiOS SSL-VPN. CVE-2022-42475 was given a 9.3 on the common vulnerability scoring system and has been exploited in the wild at least once.


Citrix has released security updates to address a critical vulnerability (CVE-2022-27518) in Citrix ADC and Citrix Gateway that is being actively exploited.


Android OEMs platform certifications and keys are getting heavily abused to obtain digital signatures on malicious applications to gain privilege access.


A high-severity Type Confusion vulnerability in the V8 JavaScript engine affects all the Chrome versions that allow attackers to exploit the bug remotely by executing arbitrary code. Google has reported this vulnerability being actively exploited.


Billbug is a State-sponsored actor that has targeted Cert Authority and Government Agencies in multiple Asian countries. Campaign has been ongoing at least since March 2022.


VMware patches critical Cloud Foundation vulnerability, tracked as CVE-2021-39144 in XStream open source library.


A newly discovered fully undetectable PowerShell backdoor, created by threat actors uses a unique approach of disguising itself as part of a Windows update process.


Apple addressed the recent actively exploited zero-day vulnerability, tracked as CVE2022-42827, in iOS 16.1 and iPadOS 16 devices with improved bounds checking.


Zimbra has released updates to address a critical code execution vulnerability that is being actively exploited. The vulnerability, CVE-2022- 41352, affects the Amavis open-source content filter component of Zimbra Collaboration Suite versions 8.8.15 and 9.0.


Fortinet released updates for the exploited Authentication Bypass Vulnerability CVE-2022- 40684 giving details of mitigation guidance for vulnerable products.


A new Chinese-language command-and-control (C2) attack framework is being widely used in attacks targeting Windows, Linux and Mac machines. It is equipped with a new malware, named Insekt, having remote administration functionalities.


Microsoft announced disabling basic authentication access for MAPI, RPC, Offline Address Book (OAB), Exchange Web Services (EWS), POP, IMAP, Exchange ActiveSync (EAS), and Remote PowerShell to improve Exchange Online security.


Microsoft Exchange Server vulnerabilities updates on previously known zero-day remote code execution vulnerabilities identified as CVE-2022-41040 and CVE2022-41082.


Fortinet released patches for a critical authentication bypass vulnerability tracked as CVE-2022-40684 which allows threat actors to log into unpatched FortiGate devices.


A new phishing campaign by a state-sponsored group, tracked as ZINC, uses weaponized legitimate opensource software such as putty, with objectives focused on espionage, data theft, financial gain, and network destruction.


• Oktapus Phishing - a recent spike in Smishing

• New GoLang malware campaign, GO#WEBBFUSCATOR, decoys targets in viewing images that are loaded with a GoLang Malware.

• Microsoft Teams store Unencrypted Authentication Tokens

• Critical Zero-day Sophos Firewall Remote Code execution vulnerability, CVE-2022-3236, has been patched

• Malicious OAuth Applications


Essential Advisories Recap for September 2022


Attackers exploited a zero-day remote code execution (RCE) vulnerability in Sophos Firewall. Patch has been released for the same.


Vectra security team recently identified that Microsoft Teams stores authentication tokens in unencrypted plaintext mode, allowing attackers to potentially control communications within an organization.


Apple released security updates to address multiple vulnerabilities reported in its products.

Download the Security Alert Brochure