8分钟
紧急威胁响应
Rapid7 Observed Exploitation of Critical MOVEit Transfer 脆弱性
Rapid7 managed services teams are observing exploitation of a critical vulnerability in Progress Software’s MOVEit Transfer solution across multiple customer environments.
2分钟
紧急威胁响应
Widespread Exploitation of Zyxel Network Devices
Rapid7 is tracking reports of ongoing exploitation of CVE-2023-28771, a critical unauthenticated comm和 injection vulnerability affecting multiple Zyxel networking devices.
2分钟
紧急威胁响应
CVE-2023-27350: Ongoing Exploitation of PaperCut Remote Code Execution 脆弱性
CVE-2023-27350 is an unauthenticated remote code execution vulnerability in PaperCut MF/NG print management software. A patch is available for this vulnerability 和 should be applied on an emergency basis.
3分钟
紧急威胁响应
Backdoored 3CXDesktopApp Installer Used in Active Threat Campaign
紧急威胁发展迅速. We will update this blog with new information
as it comes to light 和 we are able to verify it. 埃里克·加林金,泰德·塞缪尔斯,
Zach Dayton, Eoin Miller, Caitlin Condon, Stephen Fewer, Spencer McIntyre, 和
Christiaan Beek all contributed to this blog.
On Wednesday, March 29, 2023, multiple security firms issued
[http://www.crowdstrike.com/blog/crowdstrike-detects-和-prevents-active-intrusion-campaign-targeting-3cxdesktopapp-customers/]
警告
[http://www.s
1分钟
紧急威胁响应
Active Exploitation of IBM Aspera Faspex CVE-2022-47986
Rapid7 is aware of at least one incident where a customer was compromised via CVE-2022-47986. We strongly recommend patching on an emergency basis.
3分钟
紧急威胁响应
Rapid7-Observed Exploitation of Adobe ColdFusion
Rapid7’s 威胁情报 和 检测 Engineering team has identified active exploitation of Adobe ColdFusion in multiple customer environments.
4分钟
紧急威胁响应
Active Exploitation of ZK Framework CVE-2022-36537
Rapid7 is aware of active exploitation of CVE-2022-36537 in vulnerable versions of ConnectWise R1Soft Server Backup 经理 software.
2分钟
紧急威胁响应
CVE-2022-21587: Rapid7 Observed Exploitation of Oracle E-Business Suite 脆弱性
紧急威胁发展迅速, 和 as we learn more about this vulnerability,
这篇博客文章也将继续发展.
Rapid7 is responding to various compromises arising from the exploitation of
cve - 2022 - 21587 (http://nvd.nist.. gov/vuln/detail/CVE-2022-21587],一个关键
arbitrary file upload vulnerability (rated 9.(CVSS v3风险度量)
影响Oracle E-Business Suite (EBS). Oracle发布了一个关键补丁
更新建议[http://www].甲骨文.com/security-alerts/cpuoct2022.html]
Octob
2分钟
紧急威胁响应
CVE-2023-22501: Critical Broken Authentication Flaw in Jira Service Management 产品
Atlassian has published an advisory for CVE-2023-22501, a critical broken authentication vulnerability affecting Jira service management products.
2分钟
紧急威胁响应
Ransomware Campaign Compromising VMware ESXi Servers
Hosting provider OVH 和 French CERT has issued a warning about a ransomware campaign that appears to be using CVE-2021-21974 to target VMware ESXi servers.
3分钟
紧急威胁响应
Exploitation of GoAnywhere MFT zero-day vulnerability
A warning has been issued about an actively exploited zero-day vulnerability affecting on-premise instances of Fortra’s GoAnywhere MFT.
1分钟
紧急威胁响应
Exploitation of Control Web Panel CVE-2022-44877
Security researcher Numan Türle published a proof-of-concept exploit for CVE-2022-44877 in early January. 成功ful exploitation has since been observed in the wild.
7分钟
紧急威胁响应
CVE-2022-47966: Rapid7 Observed Exploitation of Critical ManageEngine 脆弱性
Rapid7 is responding to various compromises arising from the exploitation of CVE-2022-47966, a vulnerability impacting at least 24 ManageEngine products.
2分钟
紧急威胁响应
CVE-2022-41080, CVE-2022-41082: Rapid7 Observed Exploitation of `OWASSRF` in Exchange for RCE
12月20日开始, 2022, Rapid7 has responded to an increase in the number of Microsoft Exchange server compromises. Further investigation aligned these attacks to what CrowdStrike is reporting as “OWASSRF”.
1分钟
紧急威胁响应
CVE-2022-27518: Critical Fix Released for Exploited Citrix ADC, Gateway 脆弱性
周二, 12月13日, 2022, Citrix published Citrix ADC 和 Citrix Gateway Security Bulletin for CVE-2022-27518 announcing fixes for a critical unauthenticated remote code execution (RCE) vulnerability.