<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>DEVOQ Technology</title>
	<atom:link href="https://www.devoq.gr/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.devoq.gr</link>
	<description></description>
	<lastBuildDate>Wed, 30 Jul 2025 09:30:36 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://i0.wp.com/www.devoq.gr/wp-content/uploads/2018/07/cropped-logo_ico.png?fit=32%2C32&#038;ssl=1</url>
	<title>DEVOQ Technology</title>
	<link>https://www.devoq.gr</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">192885280</site>	<item>
		<title>DEVOQ Technology supports GRNOG</title>
		<link>https://www.devoq.gr/2025/07/30/devoq-technology-supports-grnog/</link>
					<comments>https://www.devoq.gr/2025/07/30/devoq-technology-supports-grnog/#respond</comments>
		
		<dc:creator><![CDATA[DEVOQ Technology]]></dc:creator>
		<pubDate>Wed, 30 Jul 2025 09:07:08 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[DEVOQ]]></category>
		<category><![CDATA[DEVOQ supports GRNOG]]></category>
		<category><![CDATA[DEVOQ Technology]]></category>
		<category><![CDATA[GRNOG]]></category>
		<guid isPermaLink="false">https://www.devoq.gr/?p=11115696</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[
<div class="row"  id="row-483152375">


	<div id="col-439998532" class="col small-12 large-12"  >
				<div class="col-inner"  >
			
			

	<div class="img has-hover x md-x lg-x y md-y lg-y" id="image_892082317">
								<div class="img-inner dark" >
			<img data-recalc-dims="1" fetchpriority="high" decoding="async" width="1020" height="282" src="https://i0.wp.com/www.devoq.gr/wp-content/uploads/2025/07/devoq-supports-grnog.jpg?resize=1020%2C282&#038;ssl=1" class="attachment-original size-original" alt="" srcset="https://i0.wp.com/www.devoq.gr/wp-content/uploads/2025/07/devoq-supports-grnog.jpg?w=1250&amp;ssl=1 1250w, https://i0.wp.com/www.devoq.gr/wp-content/uploads/2025/07/devoq-supports-grnog.jpg?resize=800%2C221&amp;ssl=1 800w, https://i0.wp.com/www.devoq.gr/wp-content/uploads/2025/07/devoq-supports-grnog.jpg?resize=768%2C212&amp;ssl=1 768w" sizes="(max-width: 1020px) 100vw, 1020px" />						
					</div>
								
<style>
#image_892082317 {
  width: 100%;
}
</style>
	</div>
	


		</div>
					</div>

	

</div>
<div class="row"  id="row-1859925636">


	<div id="col-1793220479" class="col small-12 large-12"  >
				<div class="col-inner"  >
			
			

<h3 style="text-align: center;"><span style="color: #282828; font-size: 140%;">DEVOQ Technology supports GRNOG!</span></h3>
<p> </p>
<p style="text-align: center;"><span style="color: #282828;"><strong>DEVOQ</strong> is a consulting company, operating in the technology sector, both software and hardware, in the key area of information and systems security.</span></p>
<p style="text-align: center;"><span style="color: #282828;"><strong>GRNOG</strong> (Greek Network Operators Group) is a community of professionals that are involved in the design, implementation, provisioning and operation of Greek Internet services, networks and infrastructure.</span></p>
<p style="text-align: center;"><span style="color: #282828;">Within this scope, the purpose of the group is:</span></p>
<p style="text-align: center;"><span style="color: #282828;">to create a human network of professionals with common technical interests</span><br /><span style="color: #282828;">to facilitate the exchange of knowledge and information among its members</span><br /><span style="color: #282828;">to promote the cooperation between companies, bodies and parties related to the Greek Internet</span><br /><span style="color: #282828;">to disseminate Greek and global Internet developments, emerging technologies, best operating practices and standards</span><br /><span style="color: #282828;">to develop tools, policies, practices and means of communication that facilitate day-to-day operations and long-term design and planning</span></p>
<p style="text-align: center;"><span style="color: #282828;"><strong>Join GRNOG!</strong></span><br /><span style="color: #282828;">If you want to join this amazing community, visit GRNOG website and find out how to register!</span></p>
<p style="text-align: center;"><a href="https://grnog.gr" target="_blank" rel="noopener"><span style="color: #282828;"> https://grnog.gr</span></a></p>

		</div>
					</div>

	

</div>

]]></content:encoded>
					
					<wfw:commentRss>https://www.devoq.gr/2025/07/30/devoq-technology-supports-grnog/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11115696</post-id>	</item>
		<item>
		<title>Threat Advisory – September 1 &#8211; 7</title>
		<link>https://www.devoq.gr/2022/09/07/threat-advisory-september-1-7/</link>
					<comments>https://www.devoq.gr/2022/09/07/threat-advisory-september-1-7/#respond</comments>
		
		<dc:creator><![CDATA[DEVOQ Technology]]></dc:creator>
		<pubDate>Wed, 07 Sep 2022 10:19:42 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[D-Link devices]]></category>
		<category><![CDATA[Mirai botnet]]></category>
		<category><![CDATA[MooBot]]></category>
		<guid isPermaLink="false">https://devoq.gr/?p=11114952</guid>

					<description><![CDATA[A variant of the Mirai botnet known as MooBot is co-opting vulnerable D-Link devices into an army of denial-of-service bots by taking advantage of multiple exploits.]]></description>
										<content:encoded><![CDATA[
	<div id="text-2930489341" class="text">
		

<h1><span style="color: #282828;">CySec News</span></h1>
<p><span style="color: #282828;">A variant of the Mirai botnet known as MooBot is co-opting vulnerable D-Link devices into an army of denial-of-service bots by taking advantage of multiple exploits.</span></p>
<p><span style="color: #282828;"><strong>Reference:</strong> https://thehackernews.com/2022/09/mirai-variant-moobot-botnet-exploiting.html</span></p>
<p> </p>
<p><span style="color: #282828;">Networking equipment maker Zyxel has released patches for a critical security flaw impacting its network-attached storage (NAS) devices. Tracked as <a style="color: #282828;" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34747" target="_blank" rel="noopener">CVE-2022-34747</a> (CVSS score: 9.8), the issue relates to a &#8220;format string vulnerability&#8221; affecting NAS326, NAS540, and NAS542 models. Zyxel credited researcher Shaposhnikov Ilya for reporting the flaw.</span></p>
<p><span style="color: #282828;"><strong>Reference:</strong> https://thehackernews.com/2022/09/critical-rce-vulnerability-affects.html</span></p>
<p> </p>
<p><span style="color: #282828;">QNAP has issued a new advisory urging users of its network-attached storage (NAS) devices to upgrade to the latest version of <a style="color: #282828;" href="https://www.qnap.com/en/software/photo-station" target="_blank" rel="noopener">Photo Station</a> following yet another wave of <a style="color: #282828;" href="https://thehackernews.com/2022/06/critical-php-vulnerability-exposes-qnap.html" target="_blank" rel="noopener">DeadBolt ransomware attacks</a> in the wild by exploiting a zero-day flaw in the software.</span></p>
<p><span style="color: #282828;"><strong>Reference:</strong> https://thehackernews.com/2022/09/qnap-warns-of-new-deadbolt-ransomware.html</span></p>
<p> </p>
<p><span style="color: #282828;">A new stealthy Linux malware known as Shikitega has been discovered infecting computers and IoT devices with additional payloads. The malware exploits vulnerabilities to elevate its privileges, adds persistence on the host via crontab, and eventually launches a cryptocurrency miner on infected devices.</span></p>
<p><span style="color: #282828;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/security/new-linux-malware-evades-detection-using-multi-stage-deployment/</span></p>
<p> </p>
<p><span style="color: #282828;">Resecurity has identified a new underground service that allows cybercriminals to bypass 2FA authentication (MFA) authentication mechanisms on a large scale without the need to hack upstream services or the supply chain. EvilProxy actors are using Reverse Proxy and Cookie Injection methods to bypass 2FA authentication – proxyfying victim’s session.</span></p>
<p><span style="color: #282828;"><strong>Reference:</strong> https://otx.alienvault.com/pulse/63175332703dcba6367c4087</span></p>
<p> </p>
<p><span style="color: #282828;">Bitdefender analyzed a recent industrial espionage operation targeting a small (under 200 employees) technology company based in the United States. The attack was focused on information exfiltration and spans several months. A vast network of several hundred IP addresses (most of them originated from China) was used as part of this attack.</span></p>
<p><span style="color: #282828;"><strong>Reference:</strong> https://otx.alienvault.com/pulse/6310c8b1ae9f85af2d64d77d</span></p>
<p> </p>
<p><span style="color: #282828;">The Securonix Threat research team has recently identified a unique sample of a persistent Golang-based attack campaign tracked by Securonix as GO#WEBBFUSCATOR. The new campaign incorporates an equally interesting strategy by leveraging the infamous deep field image taken from the James Webb telescope and obfuscated Golang programming language payloads to infect the target system with the malware.</span></p>
<p><span style="color: #282828;"><strong>Reference:</strong> https://otx.alienvault.com/pulse/630f67c49a28f85f26b91f5a</span></p>
<p> </p>
<p><span style="color: #282828;">Microsoft warned customers today that it will finally disable basic authentication in random tenants worldwide to improve Exchange Online security starting October 1, 2022.</span></p>
<p><span style="color: #282828;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/microsoft/microsoft-will-disable-exchange-online-basic-auth-next-month/</span></p>
<p> </p>
<p><span style="color: #282828;">South Korean chaebol Samsung on Friday said it experienced a cybersecurity incident that resulted in the unauthorized access of some customer information, the second time this year it has reported such a breach. &#8220;In late July 2022, an unauthorized third-party acquired information from some of Samsung&#8217;s U.S. systems,&#8221; the company <a style="color: #282828;" href="https://www.samsung.com/us/support/securityresponsecenter/" target="_blank" rel="noopener">disclosed</a> in a notice. &#8220;On or around August 4, 2022, we determined through our ongoing investigation that personal information of certain customers was affected.&#8221;</span></p>
<p><span style="color: #282828;"><strong>Reference:</strong> https://thehackernews.com/2022/09/samsung-admits-data-breach-that-exposed.html</span></p>
<p> </p>
<p><span style="color: #282828;">A bad Microsoft Defender signature update mistakenly detects Google Chrome, Microsoft Edge, Discord, and other Electron apps as &#8216;Win32/Hive.ZY&#8217; each time the apps are opened in Windows. The issue started Sunday morning when Microsoft pushed out Defender <a style="color: #282828;" href="https://www.microsoft.com/en-us/wdsi/definitions/antimalware-definition-release-notes?requestVersion=1.373.1508.0" target="_blank" rel="nofollow noopener">signature update 1.373.1508.0</a> to include two new threat detections, including <a style="color: #282828;" href="https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Behavior:Win32/Hive.ZY&amp;ThreatID=2147830806" target="_blank" rel="nofollow noopener">Behavior:Win32/Hive.ZY</a>. Microsoft issued an update to fix the issue.</span></p>
<p><span style="color: #282828;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/microsoft/microsoft-defender-falsely-detects-win32-hivezy-in-google-chrome-electron-apps/</span></p>
<p> </p>
<p><span style="color: #282828;">Chile&#8217;s national computer security and incident response team (CSIRT) has announced that a ransomware attack has impacted operations and online services of a government agency in the country. The attack started on Thursday, August 25, targeting Microsoft and VMware ESXi servers operated by the agency. The hackers stopped all running virtual machines and encrypted their files, appending the &#8220;.crypt&#8221; filename extension.</span></p>
<p><span style="color: #282828;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/security/new-ransomware-hits-windows-linux-servers-of-chile-govt-agency/</span></p>
<p> </p>
<p><span style="color: #282828;">The government of Montenegro has provided more information about the attack on its critical infrastructure saying that ransomware is responsible for the damage and disruptions. Public Administration Minister Maras Dukaj stated on local television yesterday that behind the attack is an organized cybercrime group. The effects of the incindet continue for the tenth day. The minister added that a &#8220;special virus&#8221; is used in this attack and there is a ransom demand of $10 million.</span></p>
<p><span style="color: #282828;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/security/montenegro-hit-by-ransomware-attack-hackers-demand-10-million/</span></p>
<p> </p>
<p><span style="color: #282828;">A new Instagram phishing campaign is underway, attempting to scam users of the popular social media platform by luring them with a blue-badge offer. Blue badges are highly coveted as Instagram provides them to accounts it verified to be authentic, representing a public figure, celebrity, or brand. The spear emails in the recently observed phishing campaign inform recipients that they Instagram reviewed their accounts and deemed them eligible for a blue badge.</span></p>
<p><span style="color: #282828;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/security/thousands-lured-with-blue-badges-in-instagram-phishing-attack/</span></p>
		
<style>
#text-2930489341 {
  text-align: center;
  color: rgb(0,0,0);
}
#text-2930489341 > * {
  color: rgb(0,0,0);
}
</style>
	</div>
	

]]></content:encoded>
					
					<wfw:commentRss>https://www.devoq.gr/2022/09/07/threat-advisory-september-1-7/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11114952</post-id>	</item>
		<item>
		<title>Threat Advisory – August 25 &#8211; 31</title>
		<link>https://www.devoq.gr/2022/08/31/threat-advisory-august-25-31/</link>
					<comments>https://www.devoq.gr/2022/08/31/threat-advisory-august-25-31/#respond</comments>
		
		<dc:creator><![CDATA[DEVOQ Technology]]></dc:creator>
		<pubDate>Wed, 31 Aug 2022 12:14:57 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Atlassian]]></category>
		<category><![CDATA[Bitbucket]]></category>
		<category><![CDATA[command injection vulnerability]]></category>
		<guid isPermaLink="false">https://devoq.gr/?p=11114949</guid>

					<description><![CDATA[A critical command injection vulnerability in a Bitbucket product could allow an attacker to execute arbitrary code, researchers warn]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: center;"><span style="color: #333333;">CySec News</span></h1>
<p style="text-align: center;"><span style="color: #333333;">A critical <a style="color: #333333;" href="https://portswigger.net/web-security/os-command-injection">command injection</a> vulnerability in a Bitbucket product could allow an attacker to execute arbitrary code, researchers warn. Bitbucket is a Git-based source code repository hosting service owned by Atlassian. The flaw, tracked as CVE-2022-36804, is a command injection vulnerability in multiple API endpoints of <a style="color: #333333;" href="https://confluence.atlassian.com/bitbucketserver/bitbucket-server-and-data-center-advisory-2022-08-24-1155489835.html" target="_blank" rel="noopener">Bitbucket Server and Data Center</a>.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://portswigger.net/daily-swig/critical-command-injection-vulnerability-discovered-in-bitbucket-server-and-data-center</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Password management firm LastPass was hacked two weeks ago, enabling threat actors to steal the company&#8217;s source code and proprietary technical information.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/security/lastpass-developer-systems-hacked-to-steal-source-code/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Microsoft Azure customers&#8217; virtual machines (VMs) running Ubuntu 18.04 have been taken offline by an ongoing outage caused by a faulty systemd update. The outage started nine hours earlier, around 06:00 UTC, after the affected customers upgraded to systemd version 237-3ubuntu10.54 and their VMs started experiencing DNS errors, with no DNS resolver addresses available on impacted systems.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/microsoft/microsoft-azure-outage-knocks-ubuntu-vms-offline-after-buggy-update/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Five imposter extensions for the Google Chrome web browser masquerading as Netflix viewers and others have been found to track users&#8217; browsing activity and profit of retail affiliate programs. &#8220;The extensions offer various functions such as enabling users to watch Netflix shows together, website coupons, and taking screenshots of a website,&#8221; McAfee researchers Oliver Devane and Vallabh Chole <a style="color: #333333;" href="https://www.mcafee.com/blogs/other-blogs/mcafee-labs/malicious-cookie-stuffing-chrome-extensions-with-1-4-million-users/" target="_blank" rel="noopener">said</a>.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://thehackernews.com/2022/08/experts-find-malicious-cookie-stuffing.html</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Nation-state threat actors are <a style="color: #333333;" href="https://thehackernews.com/2021/05/top-11-security-flaws-russian-spy.html" target="_blank" rel="noopener">increasingly adopting</a> and <a style="color: #333333;" href="https://team-cymru.com/blog/2022/05/03/sliver-case-study-assessing-common-offensive-security-tools/" target="_blank" rel="noopener">integrating the Sliver</a> command-and-control (C2) framework in their intrusion campaigns as a replacement for Cobalt Strike. &#8220;Given Cobalt Strike&#8217;s popularity as an attack tool, defenses against it have also improved over time,&#8221; Microsoft security experts <a style="color: #333333;" href="https://www.microsoft.com/security/blog/2022/08/24/looking-for-the-sliver-lining-hunting-for-emerging-command-and-control-frameworks/" target="_blank" rel="noopener">said</a>. &#8220;Sliver thus presents an attractive alternative for actors looking for a lesser-known toolset with a low barrier for entry.&#8221;</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://thehackernews.com/2022/08/cybercrime-groups-increasingly-adopting.html</span></p>
<h1 style="text-align: center;"><span style="color: #333333;">CVE’s of the Week</span></h1>
<h2 style="text-align: center;"><span style="color: #333333;">Cisco</span></h2>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-20921 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-20921/">CVE-2022-20921</a></span></p>
<h2 style="text-align: center;"><span style="color: #333333;">Dell</span></h2>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-33932 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-33932/">CVE-2022-33932</a></span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-32480 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-32480/">CVE-2022-32480</a></span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-31238 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-31238/">CVE-2022-31238</a></span></p>
<p style="text-align: center;"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-31237 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-31237/">CVE-2022-31237</a></span></p>

]]></content:encoded>
					
					<wfw:commentRss>https://www.devoq.gr/2022/08/31/threat-advisory-august-25-31/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11114949</post-id>	</item>
		<item>
		<title>Threat Advisory – August 18 &#8211; 24</title>
		<link>https://www.devoq.gr/2022/08/24/threat-advisory-august-18-24/</link>
					<comments>https://www.devoq.gr/2022/08/24/threat-advisory-august-18-24/#respond</comments>
		
		<dc:creator><![CDATA[DEVOQ Technology]]></dc:creator>
		<pubDate>Wed, 24 Aug 2022 06:54:25 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[CVE-2022-2884]]></category>
		<category><![CDATA[Import from GitHub API]]></category>
		<category><![CDATA[RCE]]></category>
		<guid isPermaLink="false">https://devoq.gr/?p=11114944</guid>

					<description><![CDATA[GitLab has issued a security update to address a critical vulnerability that could lead to remote code execution (RCE)]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: center;"><span style="color: #333333;">CySec News</span></h1>
<p style="text-align: center;"><span style="color: #333333;">GitLab has issued a security update to address a critical vulnerability that could lead to remote code execution (RCE). The vulnerability could allow an authenticated user to achieve remote code execution via the ‘Import from GitHub API’ endpoint, <a style="color: #333333;" href="https://about.gitlab.com/releases/2022/08/22/critical-security-release-gitlab-15-3-1-released/#Remote%20Command%20Execution%20via%20Github%20import" target="_blank" rel="noopener">an advisory</a> from GitLab reads. Tracked as CVE-2022-2884, the security issue is present in GitLab Community Edition (CE) and Enterprise Edition (EE) versions 11.3.4 before 15.1.5, all versions starting from 15.2 before 15.2.3, all versions starting from 15.3 before 15.3.1.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://portswigger.net/daily-swig/gitlab-patches-critical-remote-code-execution-bug</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday <a style="color: #333333;" href="https://www.cisa.gov/uscert/ncas/current-activity/2022/08/22/cisa-adds-one-known-exploited-vulnerabilities-catalog" target="_blank" rel="noopener">added</a> a security flaw impacting Palo Alto Networks PAN-OS to its <a style="color: #333333;" href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" target="_blank" rel="noopener">Known Exploited Vulnerabilities Catalog</a>, based on evidence of active exploitation. The high-severity vulnerability, tracked as <a style="color: #333333;" href="https://security.paloaltonetworks.com/CVE-2022-0028" target="_blank" rel="noopener">CVE-2022-0028</a> (CVSS score: 8.6), is a URL filtering policy misconfiguration that could allow an unauthenticated, remote attacker to carry out reflected and amplified TCP denial-of-service (DoS) attacks.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://thehackernews.com/2022/08/cisa-warns-of-active-exploitation-of.html</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Budget Android device models that are counterfeit versions associated with popular smartphone brands are harboring multiple trojans designed to target WhatsApp and WhatsApp Business messaging apps.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://thehackernews.com/2022/08/researchers-find-counterfeit-phones.html</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Details of an eight-year-old security vulnerability in the Linux kernel have emerged that the researchers say is &#8220;as nasty as Dirty Pipe.&#8221; Dubbed <a style="color: #333333;" href="https://github.com/markakd/dirtycred" target="_blank" rel="noopener"><strong>DirtyCred</strong></a> by a group of academics from Northwestern University, the security weakness exploits a previously unknown flaw (<a style="color: #333333;" href="https://access.redhat.com/security/cve/cve-2022-2588" target="_blank" rel="noopener">CVE-2022-2588</a>) to escalate privileges to the maximum level.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://thehackernews.com/2022/08/as-nasty-as-dirty-pipe-8-year-old-linux.html</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">More than 200 malicious packages have been discovered infiltrating the PyPI and npm open source registries this week. These packages are largely typosquats of widely used libraries and each one of them downloads a Bash script on Linux systems that run cryptominers.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/security/241-npm-and-pypi-packages-caught-dropping-linux-cryptominers/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Windows servers and workstations at dozens of organizations started to crash earlier today because of an issue caused by certain versions of VMware’s Carbon Black endpoint security solution.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/security/vmware-carbon-black-causing-bsod-crashes-on-windows/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">WordPress sites are being hacked to display fake Cloudflare DDoS protection pages to distribute malware that installs the NetSupport RAT and the RaccoonStealer password-stealing Trojan.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/security/wordpress-sites-hacked-with-fake-cloudflare-ddos-alerts-pushing-malware/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Microsoft has released Sysmon 14 with a new &#8216;FileBlockExecutable&#8217; option that lets you block the creation of malicious executables, such as EXE, DLL, and SYS files, for better protection against malware.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/microsoft/microsoft-sysmon-can-now-block-malicious-exes-from-being-created/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">DarkTortilla is a complex and highly configurable .NET-based crypter that has possibly been active since at least August 2015. It typically delivers popular information stealers and remote access trojans (RATs) such as AgentTesla, AsyncRat, NanoCore, and RedLine. While it appears to primarily deliver commodity malware, Secureworks® Counter Threat Unit™ (CTU) researchers identified DarkTortilla samples delivering targeted payloads such as Cobalt Strike and Metasploit. It can also deliver &#8220;addon packages&#8221; such as additional malicious payloads, benign decoy documents, and executables. It features robust anti-analysis and anti-tamper controls that can make detection, analysis, and eradication challenging.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://otx.alienvault.com/pulse/6304f0ff85acf796fe08ef9c</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">LockBit 3.0 aka “LockBit Black”, noted in June of this year has coincided with a large increase of victims being published to the LockBit leak site, indicating that the past few months has heralded a period of intense activity for the LockBit collective.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://otx.alienvault.com/pulse/630496070829b833c5cccc36</span></p>
<h1 style="text-align: center;"><span style="color: #333333;">CVE&#8217;s of the Week</span></h1>
<h2 style="text-align: center;"><span style="color: #333333;">Cisco</span></h2>
<table class=" aligncenter" style="border-collapse: collapse; width: 48pt;" border="0" width="64" cellspacing="0" cellpadding="0">
<tbody>
<tr style="height: 14.4pt;">
<td class="xl64" style="height: 14.4pt; width: 48pt;" width="64" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-20914 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-20914/">CVE-2022-20914</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl64" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-20869 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-20869/">CVE-2022-20869</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl64" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-20852 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-20852/">CVE-2022-20852</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl64" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-20820 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-20820/">CVE-2022-20820</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl64" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-20816 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-20816/">CVE-2022-20816</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl64" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-20713 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-20713/">CVE-2022-20713</a></span></td>
</tr>
</tbody>
</table>
<h2 style="text-align: center;"><span style="color: #333333;">Dell</span></h2>
<table class=" aligncenter" style="border-collapse: collapse; width: 48pt;" border="0" width="64" cellspacing="0" cellpadding="0">
<tbody>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt; width: 48pt;" width="64" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-34365 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-34365/">CVE-2022-34365</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-33931 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-33931/">CVE-2022-33931</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-33930 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-33930/">CVE-2022-33930</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-33929 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-33929/">CVE-2022-33929</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-33928 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-33928/">CVE-2022-33928</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-33927 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-33927/">CVE-2022-33927</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-33926 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-33926/">CVE-2022-33926</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-33925 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-33925/">CVE-2022-33925</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-33924 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-33924/">CVE-2022-33924</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-29090 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-29090/">CVE-2022-29090</a></span></td>
</tr>
</tbody>
</table>
<h2 style="text-align: center;"><span style="color: #333333;">Fortinet</span></h2>
<table class=" aligncenter" style="border-collapse: collapse; width: 48pt;" border="0" width="64" cellspacing="0" cellpadding="0">
<tbody>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt; width: 48pt;" width="64" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-27484 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-27484/">CVE-2022-27484</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-23442 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-23442/">CVE-2022-23442</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-22299 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-22299/">CVE-2022-22299</a></span></td>
</tr>
</tbody>
</table>
<h2 style="text-align: center;"><span style="color: #333333;">Microsoft</span></h2>
<table class=" aligncenter" style="border-collapse: collapse; width: 96pt;" border="0" width="128" cellspacing="0" cellpadding="0">
<tbody>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt; width: 48pt;" width="64" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35827 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35827/">CVE-2022-35827</a></span></td>
<td class="xl65" style="width: 48pt;" width="64"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35768 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35768/">CVE-2022-35768</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35826 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35826/">CVE-2022-35826</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35767 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35767/">CVE-2022-35767</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35825 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35825/">CVE-2022-35825</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35766 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35766/">CVE-2022-35766</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35824 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35824/">CVE-2022-35824</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35765 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35765/">CVE-2022-35765</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35822 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35822/">CVE-2022-35822</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35764 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35764/">CVE-2022-35764</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35821 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35821/">CVE-2022-35821</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35763 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35763/">CVE-2022-35763</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35820 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35820/">CVE-2022-35820</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35762 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35762/">CVE-2022-35762</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35819 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35819/">CVE-2022-35819</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35761 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35761/">CVE-2022-35761</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35818 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35818/">CVE-2022-35818</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35760 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35760/">CVE-2022-35760</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35817 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35817/">CVE-2022-35817</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-34717 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-34717/">CVE-2022-34717</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35816 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35816/">CVE-2022-35816</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-34716 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-34716/">CVE-2022-34716</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35815 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35815/">CVE-2022-35815</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-34715 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-34715/">CVE-2022-34715</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35814 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35814/">CVE-2022-35814</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-34714 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-34714/">CVE-2022-34714</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35813 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35813/">CVE-2022-35813</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-34713 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-34713/">CVE-2022-34713</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35812 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35812/">CVE-2022-35812</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-34712 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-34712/">CVE-2022-34712</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35811 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35811/">CVE-2022-35811</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-34711 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-34711/">CVE-2022-34711</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35810 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35810/">CVE-2022-35810</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-34710 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-34710/">CVE-2022-34710</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35809 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35809/">CVE-2022-35809</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-34709 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-34709/">CVE-2022-34709</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35808 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35808/">CVE-2022-35808</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-34708 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-34708/">CVE-2022-34708</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35807 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35807/">CVE-2022-35807</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-34707 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-34707/">CVE-2022-34707</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35806 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35806/">CVE-2022-35806</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-34706 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-34706/">CVE-2022-34706</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35804 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35804/">CVE-2022-35804</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-34705 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-34705/">CVE-2022-34705</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35802 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35802/">CVE-2022-35802</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-34704 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-34704/">CVE-2022-34704</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35801 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35801/">CVE-2022-35801</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-34703 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-34703/">CVE-2022-34703</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35800 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35800/">CVE-2022-35800</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-34702 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-34702/">CVE-2022-34702</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35799 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35799/">CVE-2022-35799</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-34701 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-34701/">CVE-2022-34701</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35797 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35797/">CVE-2022-35797</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-34699 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-34699/">CVE-2022-34699</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35796 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35796/">CVE-2022-35796</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-34696 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-34696/">CVE-2022-34696</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35795 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35795/">CVE-2022-35795</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-34692 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-34692/">CVE-2022-34692</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35794 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35794/">CVE-2022-35794</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-34691 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-34691/">CVE-2022-34691</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35793 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35793/">CVE-2022-35793</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-34690 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-34690/">CVE-2022-34690</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35792 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35792/">CVE-2022-35792</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-34687 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-34687/">CVE-2022-34687</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35791 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35791/">CVE-2022-35791</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-34686 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-34686/">CVE-2022-34686</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35790 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35790/">CVE-2022-35790</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-34685 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-34685/">CVE-2022-34685</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35789 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35789/">CVE-2022-35789</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-33670 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-33670/">CVE-2022-33670</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35788 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35788/">CVE-2022-35788</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-33649 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-33649/">CVE-2022-33649</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35787 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35787/">CVE-2022-35787</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-33648 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-33648/">CVE-2022-33648</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35786 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35786/">CVE-2022-35786</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-33646 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-33646/">CVE-2022-33646</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35785 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35785/">CVE-2022-35785</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-33640 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-33640/">CVE-2022-33640</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35784 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35784/">CVE-2022-35784</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-33636 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-33636/">CVE-2022-33636</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35783 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35783/">CVE-2022-35783</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-33631 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-33631/">CVE-2022-33631</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35782 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35782/">CVE-2022-35782</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-30197 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-30197/">CVE-2022-30197</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35781 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35781/">CVE-2022-35781</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-30194 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-30194/">CVE-2022-30194</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35780 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35780/">CVE-2022-35780</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-30176 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-30176/">CVE-2022-30176</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35779 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35779/">CVE-2022-35779</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-30175 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-30175/">CVE-2022-30175</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35777 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35777/">CVE-2022-35777</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-30144 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-30144/">CVE-2022-30144</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35776 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35776/">CVE-2022-35776</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-30134 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-30134/">CVE-2022-30134</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35775 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35775/">CVE-2022-35775</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-30133 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-30133/">CVE-2022-30133</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35774 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35774/">CVE-2022-35774</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-24516 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-24516/">CVE-2022-24516</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35773 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35773/">CVE-2022-35773</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-24477 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-24477/">CVE-2022-24477</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35772 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35772/">CVE-2022-35772</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-21980 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-21980/">CVE-2022-21980</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35771 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35771/">CVE-2022-35771</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-21979 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-21979/">CVE-2022-21979</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-35769 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-35769/">CVE-2022-35769</a></span></td>
<td class="xl65"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-2170 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-2170/">CVE-2022-2170</a></span></td>
</tr>
</tbody>
</table>
<h2 style="text-align: center;"><span style="color: #333333;">VMWare</span></h2>
<table class=" aligncenter" style="border-collapse: collapse; width: 48pt;" border="0" width="64" cellspacing="0" cellpadding="0">
<tbody>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt; width: 48pt;" width="64" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-31675 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-31675/">CVE-2022-31675</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-31674 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-31674/">CVE-2022-31674</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-31673 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-31673/">CVE-2022-31673</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-31672 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-31672/">CVE-2022-31672</a></span></td>
</tr>
<tr style="height: 14.4pt;">
<td class="xl65" style="height: 14.4pt;" height="19"><span style="color: #333333;"><a style="color: #333333;" title="CVE-2022-22983 security vulnerability details" href="https://www.cvedetails.com/cve/CVE-2022-22983/">CVE-2022-22983</a></span></td>
</tr>
</tbody>
</table>

]]></content:encoded>
					
					<wfw:commentRss>https://www.devoq.gr/2022/08/24/threat-advisory-august-18-24/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11114944</post-id>	</item>
		<item>
		<title>Threat Advisory – August 11 – 17</title>
		<link>https://www.devoq.gr/2022/08/17/threat-advisory-august-11-17/</link>
					<comments>https://www.devoq.gr/2022/08/17/threat-advisory-august-11-17/#respond</comments>
		
		<dc:creator><![CDATA[DEVOQ Technology]]></dc:creator>
		<pubDate>Wed, 17 Aug 2022 17:32:43 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Android 13]]></category>
		<guid isPermaLink="false">https://devoq.gr/?p=11114941</guid>

					<description><![CDATA[Android malware developers are already adjusting their tactics to bypass a new 'Restricted setting' security feature]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: center;"><span style="color: #333333;">CySec News</span></h1>
<p style="text-align: center;"><span style="color: #333333;">Android malware developers are already adjusting their tactics to bypass a new &#8216;Restricted setting&#8217; security feature introduced by Google in the newly released Android 13.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/security/malware-devs-already-bypassed-android-13s-new-security-feature/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Google has released a security update for the Chrome browser that addresses close to a dozen vulnerabilities, including a zero-day flaw that is being exploited in the wild. The security update is currently rolling out for Windows, Mac and Linux. Users who have automatic updates turned on should receive it in the coming days/weeks.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/security/google-fixes-fifth-chrome-zero-day-bug-exploited-this-year/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Windows users who have installed a new KB5012170 security update for Secure Boot have encountered various issues, ranging from boots failing with BitLocker Recovery prompts to performance issues. A UEFI bootloader loads immediately after a device is started and is responsible for launching the UEFI environment with the Secure Boot feature to allow only trusted code to be executed when starting the Windows booting process.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/microsoft/windows-kb5012170-update-causing-bitlocker-recovery-screens-boot-issues/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Exploit code has been released for a critical vulnerability affecting networking devices with Realtek’s RTL819x system on a chip (SoC), which are estimated to be in the millions. The flaw is identified as CVE-2022-27255 and a remote attacker could exploit it to compromise vulnerable devices from various original equipment manufacturers (OEMs), ranging from routers and access points to signal repeaters.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/security/exploit-out-for-critical-realtek-flaw-affecting-many-networking-devices/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Palo Alto Networks has issued a security advisory warning of an actively exploited high-severity vulnerability impacting PAN-OS, the operating system used by the company&#8217;s networking hardware products. The issue, tracked as CVE-2022-0028 (CVSS v3 – 8.6), is an URL filtering policy misconfiguration that could allow an unauthenticated, remote attacker to carry out amplified TCP denial-of-service (DoS) attacks.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/security/palo-alto-networks-new-pan-os-ddos-flaw-exploited-in-attacks/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Security analysts have found security issues in the payment system present on Xiaomi smartphones that rely on MediaTek chips providing the trusted execution environment (TEE) that is responsible for signing transactions. Attackers could exploit the weaknesses to sign fake payment packages using a third-party unprivileged application. The implications of such an attack would be to make the payment service unavailable or to sign transactions from the user’s mobile wallet to the threat actor’s account.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/security/xiaomi-phones-with-mediatek-chips-vulnerable-to-forged-payments/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Networking equipment major Cisco on Wednesday confirmed it was the victim of a cyberattack on May 24, 2022 after the attackers got hold of an employee&#8217;s personal Google account that contained passwords synced from their web browser.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://thehackernews.com/2022/08/cisco-confirms-its-been-hacked-by.html</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">A group of researchers has revealed details of a new vulnerability affecting Intel CPUs that enables attackers to obtain encryption keys and other secret information from the processors. Dubbed <a style="color: #333333;" href="https://aepicleak.com/" target="_blank" rel="noopener">ÆPIC Leak</a>, the weakness is the first-of-its-kind to architecturally disclose sensitive data in a manner that&#8217;s akin to an &#8220;uninitialized memory read in the CPU itself.&#8221;</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://thehackernews.com/2022/08/pic-and-squip-vulnerabilities-found-in.html</span></p>

]]></content:encoded>
					
					<wfw:commentRss>https://www.devoq.gr/2022/08/17/threat-advisory-august-11-17/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11114941</post-id>	</item>
		<item>
		<title>Threat Advisory – August 1 &#8211; 10</title>
		<link>https://www.devoq.gr/2022/08/10/threat-advisory-august-1-10/</link>
					<comments>https://www.devoq.gr/2022/08/10/threat-advisory-august-1-10/#respond</comments>
		
		<dc:creator><![CDATA[DEVOQ Technology]]></dc:creator>
		<pubDate>Wed, 10 Aug 2022 09:39:43 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://devoq.gr/?p=11114938</guid>

					<description><![CDATA[As many as 121 new security flaws were patched by Microsoft as part of its Patch Tuesday updates for the month of August,]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: center;"><span style="color: #333333;">CySec News</span></h1>
<p style="text-align: center;"><span style="color: #333333;">As many as <a style="color: #333333;" href="https://msrc.microsoft.com/update-guide/releaseNote/2022-Aug" target="_blank" rel="noopener">121 new security flaws</a> were patched by Microsoft as part of its Patch Tuesday updates for the month of August, which also includes a fix for a Support Diagnostic Tool vulnerability that the company said is being actively exploited in the wild Of the 121 bugs, 17 are rated Critical, 102 are rated Important, one is rated Moderate, and one is rated Low in severity. Two of the issues have been listed as publicly known at the time of the release.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://thehackernews.com/2022/08/microsoft-issues-patches-for-121-flaws.html</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a recently disclosed security flaw in the UnRAR utility to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation Tracked as CVE-2022-30333 (CVSS score: 7.5), the issue concerns a path traversal vulnerability in the Unix versions of UnRAR that can be triggered upon extracting a maliciously crafted RAR archive.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://thehackernews.com/2022/08/cisa-issues-warning-on-active.html</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Cisco has fixed critical security vulnerabilities affecting Small Business VPN routers and enabling unauthenticated, remote attackers to execute arbitrary code or commands and trigger denial of service (DoS) conditions on vulnerable devices. The two security flaws tracked as CVE-2022-20842 and CVE-2022-20827 were found in the web-based management interfaces and the web filter database update feature, and are both caused by insufficient input validation.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/security/cisco-fixes-critical-remote-code-execution-bug-in-vpn-routers/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">A security <a style="color: #333333;" href="https://portswigger.net/daily-swig/vulnerabilities" target="_blank" rel="noopener">vulnerability</a> in file transfer software CompleteFTP allowed unauthenticated attackers to delete arbitrary files on affected installations. Developed by EnterpriseDT of Australia, CompleteFTP is a proprietary FTP and SFTP server for Windows that supports FTPS, SFTP, and HTTPS.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://portswigger.net/daily-swig/completeftp-path-traversal-flaw-allowed-attackers-to-delete-server-files</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Virtualization services provider VMware on Tuesday shipped updates to <a style="color: #333333;" href="https://www.vmware.com/security/advisories/VMSA-2022-0021.html" target="_blank" rel="noopener">address 10 security flaws</a> affecting multiple products that could be abused by unauthenticated attackers to perform malicious actions. The issues, tracked from CVE-2022-31656 through CVE-2022-31665 (CVSS scores: 4.7 &#8211; 9.8), impact VMware Workspace ONE Access, Workspace ONE Access Connector, Identity Manager, Identity Manager Connector, vRealize Automation, Cloud Foundation, and vRealize Suite Lifecycle Manager.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://thehackernews.com/2022/08/vmware-releases-patches-for-several-new.html</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Microsoft says that some of the Exchange Server flaws addressed as part of the August 2022 Patch Tuesday also require admins to manually enable Extended Protection on affected servers to fully block attacks. The company patched 121 flaws today, including the <a style="color: #333333;" href="https://www.bleepingcomputer.com/news/microsoft/microsoft-patches-windows-dogwalk-zero-day-exploited-in-attacks/" target="_blank" rel="noopener">DogWalk Windows zero-day</a> exploited in the wild and several Exchange vulnerabilities (<a style="color: #333333;" href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-21980" target="_blank" rel="nofollow noopener"><u>CVE-2022-21980</u></a>, <a style="color: #333333;" href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-24477" target="_blank" rel="nofollow noopener"><u>CVE-2022-24477</u></a>, and <a style="color: #333333;" href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-24516" target="_blank" rel="nofollow noopener"><u>CVE-2022-24516</u></a>) rated as critical severity and allowing for privilege escalation.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/microsoft/microsoft-exchange-extended-protection-needed-to-fully-patch-new-bugs/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Open source DevOps platform Jenkins is warning users of unpatched security vulnerabilities impacting more than a dozen plugins. The organization’s latest <a style="color: #333333;" href="https://www.jenkins.io/security/advisory/2022-07-27/" target="_blank" rel="nofollow noopener">security advisory</a> lists a total of 27 plugin vulnerabilities, five of which were deemed to be ‘high’ impact and the majority of which remain unpatched.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://portswigger.net/daily-swig/jenkins-security-unpatched-xss-csrf-bugs-included-in-latest-plugin-advisory</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">In the last few weeks of July 2022, researchers reported two attacks where Steganography was used to deliver malware payloads. In the <a style="color: #333333;" href="https://www.trendmicro.com/en_us/research/22/g/alibaba-oss-buckets-compromised-to-distribute-malicious-shell-sc.html">first event</a>, TAs compromised Alibaba OSS Buckets to Distribute Malicious Shell Scripts via Steganography. In the <a style="color: #333333;" href="https://www.bleepingcomputer.com/news/microsoft/microsoft-windows-adobe-zero-days-used-to-deploy-subzero-malware/">other event</a>, KNOTWEED malware used the JPEG file to hide Corelump malware. Interestingly, the same technique was used in both incidents to hide the malware payload inside image files. The malicious code was appended after the image content, which ensured that the victim could only access the image without seeing the malicious code. However, accessing stegomalware will not execute any embedded content. Rather, it will be accessed and executed by other programs.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://blog.cyble.com/2022/08/04/stegomalware-identifying-possible-attack-vectors/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Smart App Control, a Windows 11 security feature that blocks threats at the process level, now comes with support for blocking several file types threat actors have recently adopted to infect targets with malware in phishing attacks.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/microsoft/windows-11-smart-app-control-blocks-files-used-to-push-malware/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Microsoft has introduced an optional feature to its <a style="color: #333333;" href="https://portswigger.net/daily-swig/edge" target="_blank" rel="noopener">Edge</a> browser that applies more stringent security controls when users visit unfamiliar websites. Enhanced security mode mitigates memory-related vulnerabilities by disabling just-in-time (JIT) JavaScript compilation, while activating additional operating system protections for the browser such as arbitrary code guard and hardware-enforced stack protection, according to Microsoft. It said these changes provide “defense in depth” by making it harder for malicious sites to leverage unpatched <a style="color: #333333;" href="https://portswigger.net/daily-swig/vulnerabilities" target="_blank" rel="noopener">vulnerabilities</a> in order to write to executable code into memory.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://portswigger.net/daily-swig/microsoft-edge-deepens-defenses-against-malicious-websites-with-enhanced-security-mode</span></p>

]]></content:encoded>
					
					<wfw:commentRss>https://www.devoq.gr/2022/08/10/threat-advisory-august-1-10/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11114938</post-id>	</item>
		<item>
		<title>Threat Advisory – July 21 – 27</title>
		<link>https://www.devoq.gr/2022/07/27/threat-advisory-july-21-27/</link>
					<comments>https://www.devoq.gr/2022/07/27/threat-advisory-july-21-27/#respond</comments>
		
		<dc:creator><![CDATA[DEVOQ Technology]]></dc:creator>
		<pubDate>Wed, 27 Jul 2022 12:09:56 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://devoq.gr/?p=11114932</guid>

					<description><![CDATA[Atlassian has addressed a hardcoded credential flaw in Questions for Confluence and servlet filter bypasses in multiple other products]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: center;"><span style="color: #333333;">CySec News</span></h1>
<p style="text-align: center;"><span style="color: #333333;">Atlassian has addressed a hardcoded credential flaw in Questions for Confluence and servlet filter bypasses in multiple other products. The <a style="color: #333333;" href="https://portswigger.net/daily-swig/australia" target="_blank" rel="noopener">Australian</a> vendor of software development and collaboration tools issued security advisories with instructions for applying updates and mitigations (July 20).</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://portswigger.net/daily-swig/atlassian-patches-batch-of-critical-vulnerabilities-across-multiple-products</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Zyxel has released patches for several of its firewall products following the discovery of two security vulnerabilities that left business networks open to exploitation.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://portswigger.net/daily-swig/zyxel-firewall-vulnerabilities-left-business-networks-open-to-abuse</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Recent years have seen a growing interest in the use of <a style="color: #333333;" href="https://portswigger.net/daily-swig/machine-learning" target="_blank" rel="noopener">machine learning</a> and deep learning in cybersecurity, especially in network intrusion detection and prevention. However, according to a study by researchers at the Citadel, a military college in South Carolina, US, deep learning models trained for network intrusion detection can be bypassed through <a style="color: #333333;" href="https://portswigger.net/daily-swig/adversarial-attacks-against-machine-learning-systems-everything-you-need-to-know" target="_blank" rel="noopener">adversarial attacks</a>, specially crafted data that fools neural networks to change their behavior.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://portswigger.net/daily-swig/adversarial-attacks-can-cause-dns-amplification-fool-network-defense-systems-machine-learning-study-finds</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Serious vulnerabilities in Cisco Nexus Dashboard give attackers a viable path to executing arbitrary commands as root, uploading container image files, or performing <a style="color: #333333;" href="https://portswigger.net/daily-swig/csrf" target="_blank" rel="noopener">cross-site request forgery</a> (<a style="color: #333333;" href="https://portswigger.net/web-security/csrf">CSRF</a>) attacks.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://portswigger.net/daily-swig/cisco-patches-dangerous-bug-trio-in-nexus-dashboard</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Microsoft is warning customers that Windows updates released since June 28 will trigger printing issues on devices connected using USB. &#8220;Microsoft has received reports of issues affecting some printing devices following installation of Windows updates released June 28 ( KB5014666) and later,&#8221; Redmond explained.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-windows-10-usb-printing-breaks-due-to-recent-updates/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Microsoft has reminded customers once again that Windows Server, version 20H2, will be reaching its End of Service (EOS) in less than a month, on August 9.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/microsoft/microsoft-reminder-windows-server-20h2-reaches-eos-next-month/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">SonicWall has published a security advisory today to warn of a critical SQL injection flaw impacting the GMS (Global Management System) and Analytics On-Prem products</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/security/sonicwall-patch-critical-sql-injection-bug-immediately/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Apple on Wednesday rolled out <a style="color: #333333;" href="https://support.apple.com/en-us/HT201222" target="_blank" rel="noopener">software fixes</a> for iOS, iPadOS, macOS, tvOS, and watchOS to address a number of security flaws affecting its platforms. This includes at least 37 flaws spanning different components in iOS and macOS that range from privilege escalation to arbitrary code execution and from information disclosure to denial-of-service (DoS).</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://thehackernews.com/2022/07/apple-releases-security-patches-for-all.html</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Microsoft announced in July 21 that it resumed the rollout of VBA macro auto-blocking in downloaded Office documents after temporarily rolling it back earlier this month following user feedback.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/microsoft/microsoft-starts-blocking-office-macros-by-default-once-again/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Recent Windows 11 builds come with the Account Lockout Policy policy enabled by default which will automatically lock user accounts (including Administrator accounts) after 10 failed sign-in attempts for 10 minutes.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/microsoft/windows-11-now-blocks-rdp-brute-force-attacks-by-default/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">A previously undetected malware dubbed &#8216;Lightning Framework&#8217; that targets Linux systems can be used to backdoor infected devices using SSH and deploy rootkits to cover the attackers&#8217; tracks. Described as a &#8220;Swiss Army Knife&#8221; in a report published by Intezer, <strong>Lightning Framework</strong> is a modular malware that also comes with support for plugins.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/security/new-lightning-framework-linux-malware-installs-rootkits-backdoors/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Attackers are increasingly leveraging Internet Information Services (IIS) extensions as covert backdoors into servers, which hide deep in target environments and provide a durable persistence mechanism for attackers. While prior research has been published on specific incidents and variants, little is generally known about how attackers leverage the IIS platform as a backdoor.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://otx.alienvault.com/pulse/62e10bfe0fd0859d190ceb38</span></p>
<h1 style="text-align: center;"><span style="color: #333333;">CVE’s of the Week</span></h1>
<h2 style="text-align: center;"><span style="color: #333333;">Microsoft</span></h2>
<div class="jsx-1255046075 diff-row" style="text-align: center;" tabindex="0" role="row" data-index="31" data-known-size="17" data-item-index="31">
<div class="jsx-3445039989 diff-line side-right diff-line-modified diff-line-with-inserts"><span class="jsx-3852835299 diff-chunk diff-chunk-inserted diff-chunk-modified" style="color: #333333;">CVE-2022-33633 &#8211; Score 6.5</span></div>
</div>
<div class="jsx-1255046075 diff-row" style="text-align: center;" tabindex="0" role="row" data-index="32" data-known-size="17" data-item-index="32">
<div class="jsx-3445039989 diff-line side-right diff-line-modified diff-line-with-inserts"><span class="jsx-3852835299 diff-chunk diff-chunk-inserted diff-chunk-modified" style="color: #333333;">CVE-2022-33632 &#8211; Score 4.6</span></div>
</div>
<div class="jsx-1255046075 diff-row" style="text-align: center;" tabindex="0" role="row" data-index="33" data-known-size="17" data-item-index="33">
<div class="jsx-3445039989 diff-line side-right diff-line-modified diff-line-with-inserts"><span class="jsx-3852835299 diff-chunk diff-chunk-inserted diff-chunk-modified" style="color: #333333;">CVE-2022-30226 &#8211; Score 3.6</span></div>
</div>
<div class="jsx-1255046075 diff-row" style="text-align: center;" tabindex="0" role="row" data-index="34" data-known-size="17" data-item-index="34">
<div class="jsx-3445039989 diff-line side-right diff-line-modified diff-line-with-inserts"><span class="jsx-3852835299 diff-chunk diff-chunk-inserted diff-chunk-modified" style="color: #333333;">CVE-2022-30225 &#8211; Score 3.6</span></div>
</div>
<div class="jsx-1255046075 diff-row" style="text-align: center;" tabindex="0" role="row" data-index="35" data-known-size="17" data-item-index="35">
<div class="jsx-3445039989 diff-line side-right diff-line-modified diff-line-with-inserts"><span class="jsx-3852835299 diff-chunk diff-chunk-inserted diff-chunk-modified" style="color: #333333;">CVE-2022-30224 &#8211; Score 6.9</span></div>
</div>
<div class="jsx-1255046075 diff-row" style="text-align: center;" tabindex="0" role="row" data-index="36" data-known-size="17" data-item-index="36">
<div class="jsx-3445039989 diff-line side-right diff-line-modified diff-line-with-inserts"><span class="jsx-3852835299 diff-chunk diff-chunk-inserted diff-chunk-modified" style="color: #333333;">CVE-2022-30223 &#8211; Score 2.7</span></div>
</div>
<div class="jsx-1255046075 diff-row" style="text-align: center;" tabindex="0" role="row" data-index="37" data-known-size="17" data-item-index="37">
<div class="jsx-3445039989 diff-line side-right diff-line-modified diff-line-with-inserts"><span class="jsx-3852835299 diff-chunk diff-chunk-inserted diff-chunk-modified" style="color: #333333;">CVE-2022-30222 &#8211; Score 4.6</span></div>
</div>
<div class="jsx-1255046075 diff-row" style="text-align: center;" tabindex="0" role="row" data-index="38" data-known-size="17" data-item-index="38">
<div class="jsx-3445039989 diff-line side-right diff-line-modified diff-line-with-inserts"><span class="jsx-3852835299 diff-chunk diff-chunk-inserted diff-chunk-modified" style="color: #333333;">CVE-2022-30221 &#8211; Score 5.1</span></div>
</div>
<div class="jsx-1255046075 diff-row" style="text-align: center;" tabindex="0" role="row" data-index="39" data-known-size="17" data-item-index="39">
<div class="jsx-3445039989 diff-line side-right diff-line-modified diff-line-with-inserts"><span class="jsx-3852835299 diff-chunk diff-chunk-inserted diff-chunk-modified" style="color: #333333;">CVE-2022-30220 &#8211; Score 7.2</span></div>
</div>
<div class="jsx-1255046075 diff-row" style="text-align: center;" tabindex="0" role="row" data-index="40" data-known-size="17" data-item-index="40">
<div class="jsx-3445039989 diff-line side-right diff-line-modified diff-line-with-inserts"><span class="jsx-3852835299 diff-chunk diff-chunk-inserted diff-chunk-modified" style="color: #333333;">CVE-2022-30216 &#8211; Score 6.5</span></div>
</div>
<div class="jsx-1255046075 diff-row" style="text-align: center;" tabindex="0" role="row" data-index="41" data-known-size="17" data-item-index="41">
<div class="jsx-3445039989 diff-line side-right diff-line-modified diff-line-with-inserts"><span class="jsx-3852835299 diff-chunk diff-chunk-inserted diff-chunk-modified" style="color: #333333;">CVE-2022-30215 &#8211; Score 8.5</span></div>
</div>
<div class="jsx-1255046075 diff-row" style="text-align: center;" tabindex="0" role="row" data-index="44" data-known-size="17" data-item-index="44">
<div class="jsx-3445039989 diff-line side-right diff-line-modified diff-line-with-inserts"><span class="jsx-3852835299 diff-chunk diff-chunk-inserted diff-chunk-modified" style="color: #333333;">CVE-2022-30212 &#8211; Score 4.7</span></div>
</div>
<div class="jsx-1255046075 diff-row" style="text-align: center;" tabindex="0" role="row" data-index="45" data-known-size="17" data-item-index="45">
<div class="jsx-3445039989 diff-line side-right diff-line-modified diff-line-with-inserts"><span class="jsx-3852835299 diff-chunk diff-chunk-inserted diff-chunk-modified" style="color: #333333;">CVE-2022-30211 &#8211; Score 6.5</span></div>
</div>
<div class="jsx-1255046075 diff-row" style="text-align: center;" tabindex="0" role="row" data-index="46" data-known-size="17" data-item-index="46">
<div class="jsx-3445039989 diff-line side-right diff-line-modified diff-line-with-inserts"><span class="jsx-3852835299 diff-chunk diff-chunk-inserted diff-chunk-modified" style="color: #333333;">CVE-2022-30209 &#8211; Score 5.8</span></div>
</div>
<div class="jsx-1255046075 diff-row" style="text-align: center;" tabindex="0" role="row" data-index="47" data-known-size="17" data-item-index="47">
<div class="jsx-3445039989 diff-line side-right diff-line-modified diff-line-with-inserts"><span class="jsx-3852835299 diff-chunk diff-chunk-inserted diff-chunk-modified" style="color: #333333;">CVE-2022-30208 &#8211; Score 4</span></div>
</div>
<div class="jsx-1255046075 diff-row" style="text-align: center;" tabindex="0" role="row" data-index="48" data-known-size="17" data-item-index="48">
<div class="jsx-3445039989 diff-line side-right diff-line-modified diff-line-with-inserts"><span class="jsx-3852835299 diff-chunk diff-chunk-inserted diff-chunk-modified" style="color: #333333;">CVE-2022-30206 &#8211; Score 7.2</span></div>
</div>
<div class="jsx-1255046075 diff-row" style="text-align: center;" tabindex="0" role="row" data-index="49" data-known-size="17" data-item-index="49">
<div class="jsx-3445039989 diff-line side-right diff-line-modified diff-line-with-inserts"><span class="jsx-3852835299 diff-chunk diff-chunk-inserted diff-chunk-modified" style="color: #333333;">CVE-2022-30205 &#8211; Score 6</span></div>
</div>
<div class="jsx-1255046075 diff-row" style="text-align: center;" tabindex="0" role="row" data-index="50" data-known-size="17" data-item-index="50">
<div class="jsx-3445039989 diff-line side-right diff-line-modified diff-line-with-inserts"><span class="jsx-3852835299 diff-chunk diff-chunk-inserted diff-chunk-modified" style="color: #333333;">CVE-2022-30203 &#8211; Score 4.6</span></div>
</div>
<div class="jsx-1255046075 diff-row" style="text-align: center;" tabindex="0" role="row" data-index="51" data-known-size="17" data-item-index="51">
<div class="jsx-3445039989 diff-line side-right diff-line-modified diff-line-with-inserts"><span class="jsx-3852835299 diff-chunk diff-chunk-inserted diff-chunk-modified" style="color: #333333;">CVE-2022-30202 &#8211; Score 6.9</span></div>
</div>
<div class="jsx-3445039989 diff-line side-right diff-line-modified diff-line-with-inserts" style="text-align: center;"><span class="jsx-3852835299 diff-chunk diff-chunk-inserted diff-chunk-modified" style="color: #333333;">CVE-2022-30181 &#8211; Score 5.5</span></div>

]]></content:encoded>
					
					<wfw:commentRss>https://www.devoq.gr/2022/07/27/threat-advisory-july-21-27/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11114932</post-id>	</item>
		<item>
		<title>Threat Advisory – July 14 &#8211; 20</title>
		<link>https://www.devoq.gr/2022/07/20/threat-advisory-july-14-20/</link>
					<comments>https://www.devoq.gr/2022/07/20/threat-advisory-july-14-20/#respond</comments>
		
		<dc:creator><![CDATA[DEVOQ Technology]]></dc:creator>
		<pubDate>Wed, 20 Jul 2022 10:53:22 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://devoq.gr/?p=11114929</guid>

					<description><![CDATA[Juniper Networks has pushed security updates to address several vulnerabilities affecting multiple products,]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: center;"><span style="color: #333333;">CySec News</span></h1>
<p style="text-align: center;"><span style="color: #333333;">Juniper Networks has pushed security updates to address <a style="color: #333333;" href="https://kb.juniper.net/InfoCenter/index?page=content&amp;channel=SECURITY_ADVISORIES" target="_blank" rel="noopener">several vulnerabilities</a> affecting multiple products, some of which could be exploited to seize control of affected systems. The most critical of the flaws affect Junos Space and Contrail Networking, with the tech company urging customers to update to release versions 22.1R1 and 21.4.0, respectively.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://thehackernews.com/2022/07/juniper-releases-patches-for-critical.html</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">A new method devised to leak information and jump over air-gaps takes advantage of Serial Advanced Technology Attachment (<a style="color: #333333;" href="https://en.wikipedia.org/wiki/Serial_ATA" target="_blank" rel="noopener">SATA</a>) or Serial ATA cables as a communication medium, adding to a <a style="color: #333333;" href="https://cyber.bgu.ac.il/advanced-cyber/airgap" target="_blank" rel="noopener">long list</a> of electromagnetic, magnetic, electric, optical, and acoustic methods already demonstrated to plunder data.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://thehackernews.com/2022/07/new-air-gap-attack-uses-sata-cable-as.html</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Researchers following the activities of advanced persistent (APT) threat groups originating from China, North Korea, Iran, and Turkey say that journalists and media organizations have remained a constant target for state-aligned actors. The adversaries are either masquerading or attacking these targets because they have unique access to non-public information that could help expand a cyberespionage operation.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/security/hackers-pose-as-journalists-to-breach-news-media-org-s-networks/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">The Russian state-sponsored hacking collective known as APT29 has been attributed to a new phishing campaign that takes advantage of legitimate cloud services like Google Drive and Dropbox to deliver malicious payloads on compromised systems.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://thehackernews.com/2022/07/russian-hackers-using-dropbox-and.html</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Google has taken steps to ax dozens of fraudulent apps from the official Play Store that were spotted propagating Joker, Facestealer, and Coper malware families through the virtual marketplace.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://thehackernews.com/2022/07/several-new-play-store-apps-spotted.html</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">A large-scale phishing campaign that used adversary-in-the-middle (AiTM) phishing sites stole passwords, hijacked a user’s sign-in session, and skipped the authentication process even if the user had enabled multifactor authentication (MFA). The attackers then used the stolen credentials and session cookies to access affected users’ mailboxes and perform follow-on business email compromise (BEC) campaigns against other targets. Based on our threat data, the AiTM phishing campaign attempted to target more than 10,000 organizations since September 2021.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://otx.alienvault.com/pulse/62cfdae1d229bd7943e0efee</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">In late June 2022, HP Wolf Security isolated an unusually stealthy malware campaign that used OpenDocument text (.odt) files to distribute malware. OpenDocument is an open, vendor-neutral file format compatible with several popular office productivity suites, including Microsoft Office, LibreOffice and Apache OpenOffice. As described in a blog post by Cisco Talos, the campaign targets the hotel industry in Latin America. The targeted hotels are contacted by email with fake booking requests. In the case below, the attached document was purportedly a guest registration document.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://otx.alienvault.com/pulse/62d6a8c3abbfa5d5ea936d4a</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">In January 2022, a new browser hijacker/adware campaign named ChromeLoader (also known as Choziosi Loader and ChromeBack) was discovered. Despite using simple malicious advertisements, the malware became widespread, potentially leaking data from thousands of users and organizations. In this article, Unit42 researchers examine the technical details of this malware, focus on the evolution between its different versions and describe changes in its infection process. This article also reviews new variants that have not yet been publicly reported.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://otx.alienvault.com/pulse/62cfdc330e8f4188c32a3518</span></p>
<h1 style="text-align: center;"><span style="color: #333333;">CVE&#8217;s of the Week</span></h1>
<h2 style="text-align: center;"><span style="color: #333333;">VMWare</span></h2>
<p style="text-align: center;"><span style="color: #333333;">CVE-2022-31655 &#8211; Score 3.5</span></p>
<p style="text-align: center;"><span style="color: #333333;">CVE-2022-31654 &#8211; Score 3.5</span></p>
<h2 style="text-align: center;"><span style="color: #333333;">Cisco</span></h2>
<p style="text-align: center;"><span style="color: #333333;">CVE-2022-20862 &#8211; Score 4</span><br /><span style="color: #333333;">CVE-2022-20859 &#8211; Score 9</span><br /><span style="color: #333333;">CVE-2022-20815 &#8211; Score 4.3</span><br /><span style="color: #333333;">CVE-2022-20813 &#8211; Score 4.3</span><br /><span style="color: #333333;">CVE-2022-20812 &#8211; Score 8.5</span><br /><span style="color: #333333;">CVE-2022-20808 &#8211; Score 4</span><br /><span style="color: #333333;">CVE-2022-20800 &#8211; Score 4.3</span><br /><span style="color: #333333;">CVE-2022-20791 &#8211; Score 4</span><br /><span style="color: #333333;">CVE-2022-20768 &#8211; Score 3.5</span><br /><span style="color: #333333;">CVE-2022-20752 &#8211; Score 5</span></p>
<h2 style="text-align: center;"><span style="color: #333333;">Dell</span></h2>
<p style="text-align: center;"><span style="color: #333333;">CVE-2022-33936 &#8211; Score 10</span><br /><span style="color: #333333;">CVE-2022-32481 &#8211; Score 7.2</span><br /><span style="color: #333333;">CVE-2020-35169 &#8211; Score 7.5</span><br /><span style="color: #333333;">CVE-2020-35168 &#8211; Score 7.5</span><br /><span style="color: #333333;">CVE-2020-35167 &#8211; Score 7.5</span><br /><span style="color: #333333;">CVE-2020-35166 &#8211; Score 7.5</span><br /><span style="color: #333333;">CVE-2020-35164 &#8211; Score 7.5</span><br /><span style="color: #333333;">CVE-2020-35163 &#8211; Score 7.5</span><br /><span style="color: #333333;">CVE-2020-29508 &#8211; Score 7.5</span><br /><span style="color: #333333;">CVE-2020-29507 &#8211; Score 7.5</span><br /><span style="color: #333333;">CVE-2020-29506 &#8211; Score 7.5</span><br /><span style="color: #333333;">CVE-2020-29505 &#8211; Score 5</span></p>
<h2 style="text-align: center;"><span style="color: #333333;">Microsoft</span></h2>
<p style="text-align: center;"><span style="color: #333333;">CVE-2022-33680 &#8211; Score 5.1</span><br /><span style="color: #333333;">CVE-2022-33675 &#8211; Score 4.6</span><br /><span style="color: #333333;">CVE-2022-33674 &#8211; Score 5.8</span><br /><span style="color: #333333;">CVE-2022-33673 &#8211; Score 5.5</span><br /><span style="color: #333333;">CVE-2022-33672 &#8211; Score 5.5</span><br /><span style="color: #333333;">CVE-2022-33671 &#8211; Score 4</span><br /><span style="color: #333333;">CVE-2022-33669 &#8211; Score 4</span><br /><span style="color: #333333;">CVE-2022-33668 &#8211; Score 4</span><br /><span style="color: #333333;">CVE-2022-33667 &#8211; Score 5.5</span><br /><span style="color: #333333;">CVE-2022-33666 &#8211; Score 5.5</span><br /><span style="color: #333333;">CVE-2022-33665 &#8211; Score 5.5</span><br /><span style="color: #333333;">CVE-2022-33664 &#8211; Score 4</span><br /><span style="color: #333333;">CVE-2022-33663 &#8211; Score 5.5</span><br /><span style="color: #333333;">CVE-2022-33662 &#8211; Score 5.5</span><br /><span style="color: #333333;">CVE-2022-33661 &#8211; Score 5.5</span><br /><span style="color: #333333;">CVE-2022-33660 &#8211; Score 4</span><br /><span style="color: #333333;">CVE-2022-33659 &#8211; Score 4</span><br /><span style="color: #333333;">CVE-2022-33658 &#8211; Score 4</span><br /><span style="color: #333333;">CVE-2022-33657 &#8211; Score 5.5</span><br /><span style="color: #333333;">CVE-2022-33656 &#8211; Score 5.5</span><br /><span style="color: #333333;">CVE-2022-33655 &#8211; Score 5.5</span><br /><span style="color: #333333;">CVE-2022-33654 &#8211; Score 4</span><br /><span style="color: #333333;">CVE-2022-33653 &#8211; Score 4</span><br /><span style="color: #333333;">CVE-2022-33652 &#8211; Score 4</span><br /><span style="color: #333333;">CVE-2022-33651 &#8211; Score 4</span><br /><span style="color: #333333;">CVE-2022-33650 &#8211; Score 4</span><br /><span style="color: #333333;">CVE-2022-33644 &#8211; Score 4.4</span><br /><span style="color: #333333;">CVE-2022-33643 &#8211; Score 5.5</span><br /><span style="color: #333333;">CVE-2022-33642 &#8211; Score 6.5</span><br /><span style="color: #333333;">CVE-2022-33641 &#8211; Score 5.5</span><br /><span style="color: #333333;">CVE-2022-33637 &#8211; Score 4</span><br /><span style="color: #333333;">CVE-2022-30214 &#8211; Score 6</span><br /><span style="color: #333333;">CVE-2022-30213 &#8211; Score 2.1</span><br /><span style="color: #333333;">CVE-2022-30187 &#8211; Score 1.9</span><br /><span style="color: #333333;">CVE-2022-22711 &#8211; Score 4</span><br /><span style="color: #333333;">CVE-2022-22050 &#8211; Score 7.2</span><br /><span style="color: #333333;">CVE-2022-22049 &#8211; Score 7.2</span><br /><span style="color: #333333;">CVE-2022-22048 &#8211; Score 6.6</span><br /><span style="color: #333333;">CVE-2022-22047 &#8211; Score 7.2</span><br /><span style="color: #333333;">CVE-2022-22045 &#8211; Score 6.9</span><br /><span style="color: #333333;">CVE-2022-22043 &#8211; Score 7.2</span><br /><span style="color: #333333;">CVE-2022-22042 &#8211; Score 4</span><br /><span style="color: #333333;">CVE-2022-22041 &#8211; Score 9</span><br /><span style="color: #333333;">CVE-2022-22040 &#8211; Score 7.5</span><br /><span style="color: #333333;">CVE-2022-22039 &#8211; Score 6</span><br /><span style="color: #333333;">CVE-2022-22038 &#8211; Score 6.8</span><br /><span style="color: #333333;">CVE-2022-22037 &#8211; Score 8.5</span><br /><span style="color: #333333;">CVE-2022-22036 &#8211; Score 4.4</span><br /><span style="color: #333333;">CVE-2022-22034 &#8211; Score 7.2</span><br /><span style="color: #333333;">CVE-2022-22031 &#8211; Score 7.2</span><br /><span style="color: #333333;">CVE-2022-22029 &#8211; Score 6.8</span><br /><span style="color: #333333;">CVE-2022-22028 &#8211; Score 4.3</span><br /><span style="color: #333333;">CVE-2022-22027 &#8211; Score 6.8</span><br /><span style="color: #333333;">CVE-2022-22026 &#8211; Score 7.2</span><br /><span style="color: #333333;">CVE-2022-22025 &#8211; Score 5</span><br /><span style="color: #333333;">CVE-2022-22024 &#8211; Score 5.1</span><br /><span style="color: #333333;">CVE-2022-22023 &#8211; Score 6.9</span><br /><span style="color: #333333;">CVE-2022-22022 &#8211; Score 3.6</span><br /><span style="color: #333333;">CVE-2022-21845 &#8211; Score 4.7</span></p>

]]></content:encoded>
					
					<wfw:commentRss>https://www.devoq.gr/2022/07/20/threat-advisory-july-14-20/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11114929</post-id>	</item>
		<item>
		<title>Threat Advisory – July 7 &#8211; 13</title>
		<link>https://www.devoq.gr/2022/07/13/threat-advisory-july-7-13/</link>
					<comments>https://www.devoq.gr/2022/07/13/threat-advisory-july-7-13/#respond</comments>
		
		<dc:creator><![CDATA[DEVOQ Technology]]></dc:creator>
		<pubDate>Wed, 13 Jul 2022 10:06:27 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://devoq.gr/?p=11114925</guid>

					<description><![CDATA[Microsoft reminded customers that Windows Server, version 20H2 will be reaching its End of Service (EOS) next month, on August 9.]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: center;"><span style="color: #333333;">CySec News</span></h1>
<p style="text-align: center;"><span style="color: #333333;">Microsoft reminded customers that Windows Server, version 20H2 will be reaching its End of Service (EOS) next month, on August 9.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-windows-server-20h2-reaches-eos-next-month/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Microsoft says last week&#8217;s decision to roll back VBA macro auto-blocking in downloaded Office documents is only a temporary change.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/microsoft/microsoft-says-decision-to-unblock-office-macros-is-temporary/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Cisco on Wednesday rolled out patches for <a style="color: #333333;" href="https://tools.cisco.com/security/center/publicationListing.x" target="_blank" rel="noopener">10 security flaws</a> spanning multiple products, one of which is rated Critical in severity and could be weaponized to conduct absolute path traversal attacks. In a related development, Fortinet addressed as many as four high-severity vulnerabilities affecting FortiAnalyzer, FortiClient, FortiDeceptor, and FortiNAC.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://thehackernews.com/2022/07/cisco-and-fortinet-release-security.html</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Eight months after disclosing a high-severity privilege escalation flaw in vCenter Server&#8217;s IWA (Integrated Windows Authentication) mechanism, VMware has finally released a patch for one of the affected versions. This vulnerability (tracked as CVE-2021-22048 and reported by CrowdStrike&#8217;s Yaron Zinar and Sagi Sheinfeld) also affects VMware&#8217;s Cloud Foundation hybrid cloud platform deployments. Successful exploitation enables attackers with non-administrative access to unpatched vCenter Server deployments to elevate privileges to a higher privileged group.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/security/vmware-patches-vcenter-server-flaw-disclosed-in-november/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Microsoft has fixed 32 vulnerabilities in the Azure Site Recovery suite that could have allowed attackers to gain elevated privileges or perform remote code execution.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/security/microsoft-fixes-dozens-of-azure-site-recovery-privilege-escalation-bugs/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Microsoft says that Windows Autopatch, an enterprise service that automatically keeps Windows and Microsoft 365 software up to date, is generally available starting 11/7/2022. Windows Autopatch <a style="color: #333333;" href="https://www.bleepingcomputer.com/news/microsoft/microsoft-windows-autopatch-steals-the-fun-from-patch-tuesdays/" target="_blank" rel="noopener">was first announced in April</a> when Microsoft said it would be available for free to Microsoft customers with a Windows 10/11 Enterprise E3 license or greater starting July 2022 (it reached public preview <a style="color: #333333;" href="https://www.bleepingcomputer.com/news/microsoft/microsoft-windows-autopatch-now-available-for-public-preview/" target="_blank" rel="noopener">in early June</a>).</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/microsoft/microsoft-windows-autopatch-is-now-generally-available/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Hackers are impersonating well-known cybersecurity companies, such as CrowdStrike, in callback phishing emails to gain initial access to corporate networks. Over the past year, threat actors have increasingly used &#8220;callback&#8221; phishing campaigns that impersonate well-known companies requesting you call a number to resolve a problem, cancel a subscription renewal, or discuss another issue. When the target calls the numbers, the threat actors use social engineering to convince users to install remote access software on their devices, providing initial access to corporate networks. This access is then used to compromise the entire Windows domain.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/security/hackers-impersonate-cybersecurity-firms-in-callback-phishing-attacks/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Recently Zimperium discovered and began monitoring the growth of a wide range of malicious browser extensions with the same extension ID as that of Google Translate, deceiving users into believing that they have installed a legitimate extension. Similar to app spoofing and cloning, these malicious applications look legitimate, but underneath the surface lies code that puts personal and enterprise data at risk. These malicious extensions can perform a wide variety of attacks based on the attacker’s purpose, as the malware includes a javascript injection method from the attacker’s controlled server.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://otx.alienvault.com/pulse/62cc1954b78e7fe63ff90784</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">TrendMicro recently found a new ransomware family, which we have dubbed as HavanaCrypt, that disguises itself as a legitimate Google Software Update application and uses a Microsoft web hosting service IP address as its command-and-control (C&amp;C) server to circumvent detection.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://otx.alienvault.com/pulse/62c7f28fe2bd732167bb24dc</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">The U.S. Department of Commerce&#8217;s National Institute of Standards and Technology (NIST) has <a style="color: #333333;" href="https://csrc.nist.gov/Projects/post-quantum-cryptography" target="_blank" rel="noopener">chosen</a> the first set of quantum-resistant encryption algorithms that are designed to &#8220;withstand the assault of a future quantum computer.&#8221; The post-quantum cryptography (<a style="color: #333333;" href="https://en.wikipedia.org/wiki/Post-quantum_cryptography" target="_blank" rel="noopener">PQC</a>) technologies include the <a style="color: #333333;" href="https://pq-crystals.org/kyber/index.shtml" target="_blank" rel="noopener">CRYSTALS-Kyber</a> algorithm for general encryption, and <a style="color: #333333;" href="https://pq-crystals.org/dilithium/index.shtml" target="_blank" rel="noopener">CRYSTALS-Dilithium</a>, <a style="color: #333333;" href="https://falcon-sign.info/" target="_blank" rel="noopener">FALCON</a>, and <a style="color: #333333;" href="https://sphincs.org/" target="_blank" rel="noopener">SPHINCS+</a> for digital signatures.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://thehackernews.com/2022/07/nist-announces-first-four-quantum.html</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">The UK’s National Cyber Security Centre (NCSC) and Information Commissioner’s Office (ICO) have released a joint letter urging the legal industry not to pay ransomware demands. The <a style="color: #333333;" href="https://www.ncsc.gov.uk/files/Joint-ICO-and-NCSC-letter-to-The-Law-Society-and-The-Bar-Council-V1.pdf" target="_blank" rel="noopener">letter</a> (PDF) was released following an increase in the number of ransomware payments as tracked by both organizations and a growing suspicion that solicitors are advising their clients to give in to extortionate demands.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://portswigger.net/daily-swig/uk-ncsc-and-ico-urge-legal-sector-to-discourage-businesses-from-paying-ransomware-demands</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Organizations are increasingly using machine learning (ML) models in their applications and services without considering the security requirements they entail, a new study by security consultancy NCC Group shows.</span></p>
<p style="text-align: center;"><span style="color: #333333;">Due to the unique ways that <a style="color: #333333;" href="https://portswigger.net/daily-swig/machine-learning" target="_blank" rel="noopener">machine learning</a> systems are developed and deployed, they introduce new threat vectors that developers are often unaware of, the study finds, adding that many of the old and known threats also apply to ML systems.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://portswigger.net/daily-swig/take-threats-against-machine-learning-systems-seriously-security-firm-warns</span></p>

]]></content:encoded>
					
					<wfw:commentRss>https://www.devoq.gr/2022/07/13/threat-advisory-july-7-13/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11114925</post-id>	</item>
		<item>
		<title>Threat Advisory – June 30 – July 6</title>
		<link>https://www.devoq.gr/2022/07/06/threat-advisory-june-30-july-6/</link>
					<comments>https://www.devoq.gr/2022/07/06/threat-advisory-june-30-july-6/#respond</comments>
		
		<dc:creator><![CDATA[DEVOQ Technology]]></dc:creator>
		<pubDate>Wed, 06 Jul 2022 07:13:55 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://devoq.gr/?p=11114921</guid>

					<description><![CDATA[Gitlab has patched a critical vulnerability that could allow an attacker to execute code remotely.]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: center;"><span style="color: #333333;">CySec News</span></h1>
<p style="text-align: center;"><span style="color: #333333;">Gitlab has patched a critical <a style="color: #333333;" href="https://portswigger.net/daily-swig/vulnerabilities" target="_blank" rel="noopener">vulnerability</a> that could allow an attacker to execute code remotely. The security issue, which has been rated as critical, has been discovered in all versions of GitLab, starting from 14.0 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1. An authenticated user could import a maliciously crafted project leading to remote code execution, <a style="color: #333333;" href="https://about.gitlab.com/releases/2022/06/30/critical-security-release-gitlab-15-1-1-released/" target="_blank" rel="noopener">an advisory from GitLab</a> reads. The bug (CVE-2022-2185) has been patched in the latest version.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://portswigger.net/daily-swig/gitlab-patches-critical-rce-bug-in-latest-security-release</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">The Jenkins security team announced 34 security vulnerabilities affecting 29 plugins for the Jenkins open source automation server, 29 of the bugs being zero-days still waiting to be patched.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/security/jenkins-discloses-dozens-of-zero-day-bugs-in-multiple-plugins/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Google shipped security updates to address a high-severity zero-day vulnerability in its Chrome web browser that it said is being exploited in the wild. The shortcoming, tracked as <a style="color: #333333;" href="https://chromereleases.googleblog.com/2022/07/stable-channel-update-for-desktop.html" target="_blank" rel="noopener"><strong>CVE-2022-2294</strong></a>, relates to a heap overflow flaw in the <a style="color: #333333;" href="https://en.wikipedia.org/wiki/WebRTC" target="_blank" rel="noopener">WebRTC</a> component that provides real-time audio and video communication capabilities in browsers without the need to install plugins or download native apps.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://thehackernews.com/2022/07/update-google-chrome-browser-to-patch.html</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">A widespread software supply chain attack has targeted the NPM package manager at least since December 2021 with rogue modules designed to steal data entered in forms by users on websites that include them.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://thehackernews.com/2022/07/researchers-uncover-malicious-npm.html</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Microsoft has expanded its confidential computing offering and now allows Azure cloud computing service customers to create hardware isolated virtual machines (aka confidential VMs) with Ephemeral OS disks. With this new public preview feature, Azure customers can create ephemeral OS disks only on the local VM storage (on VM cache or VM temp disk), thus ensuring that data remains 100% confidential since it will never be sent to remote Azure Storage.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/microsoft/microsoft-azure-now-has-confidential-vms-with-ephemeral-storage/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">Microsoft has introduced a new Microsoft Defender for Endpoint (MDE) feature in public preview to help organizations detect weaknesses affecting Android and iOS devices in their enterprise networks.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/microsoft/microsoft-defender-adds-network-protection-for-android-ios-devices/</span></p>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><span style="color: #333333;">A HackerOne employee stole vulnerability reports submitted through the bug bounty platform and disclosed them to affected customers to claim financial rewards. The rogue worker had contacted about half a dozen HackerOne customers and collected bounties “in a handful of disclosures,” the company said on Friday.</span></p>
<p style="text-align: center;"><span style="color: #333333;"><strong>Reference:</strong> https://www.bleepingcomputer.com/news/security/rogue-hackerone-employee-steals-bug-reports-to-sell-on-the-side/</span></p>

]]></content:encoded>
					
					<wfw:commentRss>https://www.devoq.gr/2022/07/06/threat-advisory-june-30-july-6/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11114921</post-id>	</item>
	</channel>
</rss>
