Skip to content

Daily Threat Intel

Menu
  • Vulnerabilities
  • Malware
  • Breaches
  • Enterprise
  • Supply Chain
  • Emerging Threats
  • Cloud
  • About us
Menu

Author: Editor DTI

GLPI warns of massive exploit activity targeting one of two critical flaws disclosed in Sept.

Posted on October 10, 2022

Key takeaway: Update now to latest versions of the IT asset management software. If you can’t, implement GLPIs recommended mitigation. Attackers are targeting the flaw to execute arbitrary code on insecure servers…

Share

Pro-Russian group urges supporters to launch DDoS attacks against US civilian infrastructure

Posted on October 10, 2022

Key takeaway: Killnet briefly disrupted several US airport websites in DDoS attacks that could well be a precursor of more to come in the next few days. Airport websites in two-dozen states,…

Share

Log4j vuln tops list of CVEs that the US govt says Chinese groups are actively exploiting

Posted on October 7, 2022

Key takeaway: Ensure that you have patched these vulnerabilities—or have mitigations for them especially if your organization is in the technology, telecommunications, defense industrial base and other critical infrastructure sectors. [216 words]…

Share

Fortinet warns of critical severity remotely executable authentication bypass vulnerability

Posted on October 7, 2022

Key takeaway: Fortinet products are a popular attacker target. Update now if you have affected versions of FortiOS and FortiProxy in your environment. If you cannot patch immediately disable Internet facing HTTPS…

Share

Federal jury finds former Uber CISO guilty on criminal charges related to 2016 breach

Posted on October 6, 2022

Key takeaway: Don’t attempt to conceal a data breach. [293 words] What: A federal jury in California has convicted former Uber CISO Joseph Sullivan for attempting to conceal a 2016 data breach…

Share

CISA ups the ante on asset discovery and vulnerability detection on federal networks

Posted on October 6, 2022

Key takeaway: If you aren’t already doing continuous automated asset discovery and vulnerability enumeration on discovered assets, now is a good time to get started. [259 words] What: The US Cybersecurity and…

Share

Here’s what you need to know about the new (actively exploited) Microsoft Exchange Server 0-Days: CVE-2022-41040 and CVE-2022-41082

Posted on October 6, 2022

Latest update: Microsoft has updated its mitigation for the flaw. Implement it. [265 words] What: Two zero-day vulnerabilities exist in Microsoft Exchange Server 2013, 2016 and 2019. One of the flaws CVE-2022-41040,…

Share

Newly disclosed vulnerability in PHP package repository highlights growing software supply chain risks

Posted on October 6, 2022

Key takeaway: Attackers are increasingly trying to infiltrate software development environments via malicious and poisoned packages on public code repositories. Robust SBOM and SCA practices are key to mitigating the threat [289…

Share

Attackers Demonstrate Novel Way to Compromise EXSi Hypervisors

Posted on October 6, 2022

Key takeaway: Don’t allow vSphere Installation Bundles (VIBs) to become a vehicle for sneaking malware into your environment. (276 words) What happened: A China-based threat actor installed multiple backdoors on ESXi hypervisors…

Share

Posts pagination

Previous 1 … 7 8
  • 12 Bugs in Microsoft’s April 2025 Update to Patch Now
  • NSA, CISA, Others Warn About Fast Flux Threat: Here’s Why
  • Max Severity Bug Affects MITRE Caldera Adversary Emulation Platform
  • FBI: Russia’s APT29 May Exploit These 24 vulnerabilities-Be Aware
  • Ivanti’s New 0-Days Now in CISA’s Exploit Catalog
©2025 Daily Threat Intel | Design: Newspaperly WordPress Theme