Exploitation of Pulse Connect Secure Vulnerabilities
Many organizations from various sectors have been impacted by vulnerabilities related to Ivanti Pulse Connect. The threat actor is leveraging vulnerabilities like CVE-2019-11510, CVE-2020-8260, CVE-2020-8243, and CVE-2021-22893. The threat actor is using this access to place webshells on the Pulse Connect Secure appliance for further access and persistence.
Read MoreMitigate Microsoft Exchange Server Vulnerabilities
Microsoft newly discloses and mitigates significant four vulnerabilities affecting on-premises Exchange Server 2013, 2016, and 2019. It is possible for an attacker, once authenticated to the Exchange server, to gain access to the Active Directory environment and download the Active Directory Database.
Read MoreTop Routinely Exploited Vulnerabilities
In 2021, cyber actors continued to target vulnerabilities in perimeter-type devices.The rapid shift and increased use of remote work options, likely placed additional burden on cyber defenders struggling to maintain and keep pace with routine software patching. Hence organizations should prioritize patching for the following CVEs known to be exploited.
Read MoreHow to protect from ransomwares?
Ransomware is a type of malware threat actors use to infect computers and encrypt computer files until a ransom is paid. After the initial infection, ransomware will attempt to spread to connected systems, including shared storage drives and other accessible computers.
Read More