Threat Intelligence Brief by our Partner Fortinet

5 years ago

Top 5 Application Vulnerabilities / IPS Distribution Rank - Name - % 1. ThinkPHP.Controller.Parameter.Remote.Code.Execution - 25% 2. PHPUnit.Eval-stdin.PHP.Remote.Code.Execution - 21% 3. NETGEAR.DGN1000.CGI.Unauthenticated.Remote.Code.Execution - 19% 4. Telerik.Web.UI.RadAsyncUpload.Handling.Arbitrary.File.Upload - 19% 5. Dasan.GPON.Remote.Code.Execution - 16% Top 5…

Canada – Canada Revenue Agency (CRA)

5 years ago

The CRA has locked down 800,000 online taxpayer accounts following an internal investigation that found user logins and other sensitive…

France – European Banking Authority (EBA)

5 years ago

The first dominos to fall in the massive Microsoft breach (see above) will be government entities in the US and…

United States – Microsoft

5 years ago

Microsoft recently reported that suspected Chinese nation-state actors have exploited a flaw in Exchange that has given them access to…

Six (6) Steps to address Zero-Day Exploits on Exchange Servers

5 years ago

Four (4) zero-day vulnerabilities in Microsoft Exchange Server are being actively exploited by Hafnium, which the State Department believes is…

Serverless Computing

5 years ago

Serverless computing is a misnomer. Computing is impossible without the presence of a machine. Just like a virus needs a host, code…

United States – Spotify

5 years ago

Spotify has returned for another appearance with a credential stuffing disaster eerily similar. This time, data of approximately 100k users…

United Kingdom – UK Research and Innovation (UKRI)

5 years ago

The UK Research and Innovation (UKRI) agency is now researching a ransomware incident that encrypted data and impacted its proprietary…

United States – Nissan North America

5 years ago

Nissan North America recently suffered a data breach that resulted in source code for its mobile apps and internal tools…

Serverless Computing

5 years ago

Serverless computing is a misnomer. Computing is impossible without the presence of a machine. Just like a virus needs a host, code…