top of page
  • pgarner18

Weekly Security News Round-Up for July 1st -8th

CISA: "Cyber Threat Actors Exploit Log4Shell in VMware Horizon Systems".

CISA and CGCYBER have produced a combined Cybersecurity Advisory to alert network defenders about state-sponsored APT attackers that continue to exploit Log4Shell in VMware Horizon and Unified Access Gateway servers to gain initial access to businesses.

CISA Warns Against Exploitation of PwnKit Linux Vulnerability.

CISA's Known Exploited Vulnerabilities Catalog was updated to include "PwnKit", a Linux vulnerability that is actively being exploited.

Microsoft quietly fixes ShadowCoerce Windows NTLM Relay bug.

Microsoft addressed the 'ShadowCoerce' vulnerability in June 2022 updates, which allowed attackers to target Windows servers in NTLM relay attacks.

Threat actors may utilize this NTLM relay attack technique to take over unpatched Windows domains.

High severity OpenSSL bug could lead to remote code execution.

An OpenSSL vulnerability might enable remote code execution on server-side devices.

OpenSSL is a cryptographic package that implements SSL and TLS open source.

It generates RSA private keys and performs encryption and decryption.

Raspberry Robin Worm Targets Windows Users.

A Windows malware has infected hundreds of enterprises. The Raspberry Robin worm spreads on USB drives. Microsoft says it has identified 2019 worm artifacts,

Apple previews a new extreme security feature, Lockdown Mode.

Lockdown Mode is designed to protect users who face serious digital threats from NSO Group and other private companies that are developing state-sponsored mercenary spyware.

Fortinet patches remedy multiple path traversal vulnerabilities

Fortinet fixed several endpoint security issues.

The California-based cybersecurity company published a large number of firmware and software upgrades on Tuesday. It accounts for more than a third of all firewall and unified threat management deployments globally (July 5).

Multiple relative route traversal issues in FortiDeceptor's administrative interface provide honeypots for network hackers (CVE-2022-30302).

Google Project Zero Provides Insights About Zero-Days in 2022 So Far

Google Project Zero disclosed that around half of zero-day exploitations in H1 2022 were related to previous flaws not properly corrected. These details were revealed in a presentation at the FIRST conference titled ‘0-day In-the-Wild Exploitation in 2022…so far’.

Callback Malware Campaigns Impersonate CrowdStrike and Other Cybersecurity Companies

CrowdStrike Intelligence discovered a callback phishing attack on July 8, 2022. The phishing email claims the recipient's firm has been hacked and asks them to contact a number. This campaign uses social-engineering strategies like WIZARD SPIDER's 2021 BazarCall campaign.

This operation will likely use RATs for initial access, penetration testing tools for lateral movement, and ransomware or data extortion.

25 views0 comments

Recent Posts

See All

Press Release: SOC 2 Type 2 Certification

Fulcrum Technology Solutions, Attains SOC 2 Type 2 Certification, Demonstrating Unwavering Commitment to Client Data Security Houston, Texas, July 26, 2023 – Fulcrum Technology Solutions, LLC (Fulcrum


bottom of page