You are here

Cybersecurity

Security Awareness – $36 Million Vendor Email Compromise Attack Demonstrates Risk of Trust

Abnormal published a detailed blog post discussing a Vendor Email Compromise (VEC) attack with a 36 million dollar impact that was detected by its platform. In textbook fashion, the attacker impersonated a senior leader at a third party vendor that had a long-term relationship with the target and attempted to further gain legitimacy by cc’ing a peer business in the same sector. The spoofed emails utilized addresses with a “.cam” (not “.com”) domain, which had been set up less than a week prior to the attack.

Report: China Continues to Utilize Most Zero-Day Exploits in Latest Mandiant Report

Mandiant released a report analyzing zero-day exploitation trends in 2022 and their relation to nation state cyber activity. Overall, the company tracked 55 zero-day vulnerabilities (measured as a vulnerability exploited in the wild before a patch was released) over the course of the year, a significant increase in comparison to prior years, though not comparable to the record breaking 81 exploits tracked in 2021. Mandiant is confident that 13 of those zero-days were exploited by state actors, with China as the most enthusiastic participant, utilizing seven zero-days.

Joint Cybersecurity Advisory – Threat Actors Exploited Progress Telerik Vulnerability in U.S. Government IIS Server

Yesterday, CISA, the FBI, and MS-ISAC released a joint Cybersecurity Advisory (CSA) concerning the successful exploitation of a .NET deserialization vulnerability in the Progress Telerik user interface (UI) software (CVE-2019-18935). Successful exploitation of the vulnerability provided threat actors with remote code execution capabilities on a federal network.

Pages

Subscribe to Cybersecurity