“Wormhole” Proof of Concept Released for Wormable Windows HTTP Vulnerability

Windows HTTP Vulnerability

A proof of concept (PoC) script was released exploiting a critical vulnerability in the latest version of Windows 10 and Windows Server additions. The vulnerability, tracked as CVE-2021-31166 was found in the HTTP Protocol Stack (HTTP.sys), used by the Windows Information (IIS) webserver. The Windows HTTP vulnerability has wormable properties, meaning it is self-propagating, unlike […]

4 Business Questions About IoT Devices

IoT Devices

Are your IoT devices secure? Internet of things (IoT) devices have seen year on year increases in business and personal use because they are usually beneficial in being convenient and easy to use. IoT devices are used for various purposes, from making smart homes to implementing a business’s security system. As with all internet connected […]

“Sapped” Critical Vulnerabilities are Exploited in SAP Applications

Cyber security firm, Onapsis, has warned of 6 critical vulnerabilities being actively exploited in the wild. The researchers recorded more than 300 successful attacks between mid-2020 and April 2021. SAP systems are used by many organisations for managing critical business processes, including product life-cycle management, customer relationship management, enterprise resource planning and supply chain management. […]

“Offroad” Vulnerable Dell Drivers Endangers Millions of Systems

dell drivers

Older Dell users should be aware of a vulnerable driver that has been pushed out to consumer and enterprise computers for the last 12 years. The multiple vulnerabilities could lead to privilege escalation. Millions of Dell desktops, laptops and tablets received the vulnerable driver through BIOS updates. The 5 vulnerabilities tracked as CVE-2021-21551 discovered in […]

Password Manager Hacked to Deploy Malware on Customer Systems

password manager

A currently unidentified threat actor has compromised the update mechanism of Passwordstate, a password manager application primarily catering to enterprise customers, and has deployed malware on its user’s devices. Click Studios, the firm behind Passwordstate, has notified 29,000 customers via email, according to communications obtained by a Polish tech news site. The malware was live […]

Cyber Supply Chain Risk Management – Should Penetration Testing be Required?

Let us begin by describing how to approach Cyber Supply Chain Risk Management (C-SCRM) and the risks your vendors pose to you. Then we will discuss if you should require them to show evidence that penetration testing was conducted and what remediations were taken. C-SCRM in a nutshell For simplicity let us split suppliers into […]

120 Compromised Advertisement Servers Put Millions of Internet Users at Risk

advertisement servers

An ongoing “malvertising” campaign dubbed “Tag Barnakle” was identified as the breach point of more than 120 Advertisement servers over the past year. The threat actors aim to inject code to host Adware that redirects users to domains under threat actors’ control, exposing them to more malware. The adversaries behind the Tag Barnakle campaign are […]

Shut Down the 5 Deadliest Web Application Attack Vectors

Web Application Attack Vectors

additionally,  Last update: 25 January 2022 Web applications are an essential component of any modern business. They can help convey the company vision, advertise services and deliver content to customers. Regardless of their use, they are a necessity to make oneself or a business known to the world. However, as beneficial as they can be […]

FBI & CISA Warning – FortiOS Vulnerabilities are Actively Exploited

FortiOS Vulnerabilities

APT’s exploit Fortinet FortiOS vulnerabilities to compromise systems belonging to government and commercial entities, warn US agencies. Threat actors are scanning for three high severity vulnerabilities that have not been patched. CVE-2018-13379, CVE-2020-12812 and, CVE-2019-5591 are actively being exploited. Each of these vulnerabilities is public and the vendor issued patches, but unless IT administrators apply […]

Risk Crew