贴有“紧急威胁响应”标签的帖子

8分钟 紧急威胁响应

Rapid7 Observed Exploitation of Critical MOVEit Transfer 脆弱性

Rapid7 managed services teams are observing exploitation of a critical vulnerability in Progress Software’s MOVEit Transfer solution across multiple customer environments.

2分钟 紧急威胁响应

Widespread Exploitation of Zyxel Network Devices

Rapid7 is tracking reports of ongoing exploitation of CVE-2023-28771, a critical unauthenticated comm和 injection vulnerability affecting multiple Zyxel networking devices.

2分钟 紧急威胁响应

CVE-2023-27350: Ongoing Exploitation of PaperCut Remote Code Execution 脆弱性

CVE-2023-27350 is an unauthenticated remote code execution vulnerability in PaperCut MF/NG print management software. A patch is available for this vulnerability 和 should be applied on an emergency basis.

3分钟 紧急威胁响应

Backdoored 3CXDesktopApp Installer Used in Active Threat Campaign

紧急威胁发展迅速. We will update this blog with new information as it comes to light 和 we are able to verify it. 埃里克·加林金,泰德·塞缪尔斯, Zach Dayton, Eoin Miller, Caitlin Condon, Stephen Fewer, Spencer McIntyre, 和 Christiaan Beek all contributed to this blog. On Wednesday, March 29, 2023, multiple security firms issued [http://www.crowdstrike.com/blog/crowdstrike-detects-和-prevents-active-intrusion-campaign-targeting-3cxdesktopapp-customers/] 警告 [http://www.s

1分钟 紧急威胁响应

Active Exploitation of IBM Aspera Faspex CVE-2022-47986

Rapid7 is aware of at least one incident where a customer was compromised via CVE-2022-47986. We strongly recommend patching on an emergency basis.

3分钟 紧急威胁响应

Rapid7-Observed Exploitation of Adobe ColdFusion

Rapid7’s 威胁情报 和 检测 Engineering team has identified active exploitation of Adobe ColdFusion in multiple customer environments.

4分钟 紧急威胁响应

Active Exploitation of ZK Framework CVE-2022-36537

Rapid7 is aware of active exploitation of CVE-2022-36537 in vulnerable versions of ConnectWise R1Soft Server Backup 经理 software.

2分钟 紧急威胁响应

CVE-2022-21587: Rapid7 Observed Exploitation of Oracle E-Business Suite 脆弱性

紧急威胁发展迅速, 和 as we learn more about this vulnerability, 这篇博客文章也将继续发展. Rapid7 is responding to various compromises arising from the exploitation of cve - 2022 - 21587 (http://nvd.nist.. gov/vuln/detail/CVE-2022-21587],一个关键 arbitrary file upload vulnerability (rated 9.(CVSS v3风险度量) 影响Oracle E-Business Suite (EBS). Oracle发布了一个关键补丁 更新建议[http://www].甲骨文.com/security-alerts/cpuoct2022.html] Octob

2分钟 紧急威胁响应

CVE-2023-22501: Critical Broken Authentication Flaw in Jira Service Management 产品

Atlassian has published an advisory for CVE-2023-22501, a critical broken authentication vulnerability affecting Jira service management products.

2分钟 紧急威胁响应

Ransomware Campaign Compromising VMware ESXi Servers

Hosting provider OVH 和 French CERT has issued a warning about a ransomware campaign that appears to be using CVE-2021-21974 to target VMware ESXi servers.

3分钟 紧急威胁响应

Exploitation of GoAnywhere MFT zero-day vulnerability

A warning has been issued about an actively exploited zero-day vulnerability affecting on-premise instances of Fortra’s GoAnywhere MFT.

1分钟 紧急威胁响应

Exploitation of Control Web Panel CVE-2022-44877

Security researcher Numan Türle published a proof-of-concept exploit for CVE-2022-44877 in early January. 成功ful exploitation has since been observed in the wild.

7分钟 紧急威胁响应

CVE-2022-47966: Rapid7 Observed Exploitation of Critical ManageEngine 脆弱性

Rapid7 is responding to various compromises arising from the exploitation of CVE-2022-47966, a vulnerability impacting at least 24 ManageEngine products.

2分钟 紧急威胁响应

CVE-2022-41080, CVE-2022-41082: Rapid7 Observed Exploitation of `OWASSRF` in Exchange for RCE

12月20日开始, 2022, Rapid7 has responded to an increase in the number of Microsoft Exchange server compromises. Further investigation aligned these attacks to what CrowdStrike is reporting as “OWASSRF”.

1分钟 紧急威胁响应

CVE-2022-27518: Critical Fix Released for Exploited Citrix ADC, Gateway 脆弱性

周二, 12月13日, 2022, Citrix published Citrix ADC 和 Citrix Gateway Security Bulletin for CVE-2022-27518 announcing fixes for a critical unauthenticated remote code execution (RCE) vulnerability.