ID | Votes | Profile Description |
---|---|---|
Printnightmare | 3 | PrintNightmare (CVE-2021-34527) is a significant vulnerability in the Windows Print Spooler service that allows an attacker to escalate privileges either locally or remotely by loading a malicious DLL which will be executed as SYSTEM. This flaw, potentially a new zero-day Microsoft vulnerability, en |
ID | Type | Votes | Profile Description |
---|---|---|---|
Black Basta | Unspecified | 1 | Black Basta is a notorious malware entity known for its devastating ransomware attacks. First emerging in June 2022, the group has since been associated with a series of high-profile cyber-attacks worldwide. This malware, like others, infiltrates systems through suspicious downloads, emails, or webs |
Bazarloader | Unspecified | 1 | BazarLoader is a form of malware that has been utilized extensively by ITG23, a cybercriminal group. This harmful software infiltrates systems via suspicious downloads, emails, or websites, potentially stealing personal information, disrupting operations, or holding data for ransom. ITG23 has used B |
Conti’s | Unspecified | 1 | None |
Conti | Unspecified | 1 | Conti is a type of malware, specifically ransomware, known for its ability to disrupt operations, steal personal information, and hold data hostage for ransom. The malicious software infiltrates systems via suspicious downloads, emails, or websites, often unbeknownst to the user. It has been used in |
ID | Type | Votes | Profile Description |
---|---|---|---|
Forest Blizzard | Unspecified | 1 | Forest Blizzard, also known as APT28, Fancy Bear, and Strontium, is a threat actor linked to the Russian General Staff Main Intelligence Directorate (GRU) and the 85th Main Special Service Center (GTsSS). The group has been involved in persistent espionage campaigns against European countries, which |
ID | Type | Votes | Profile Description |
---|---|---|---|
Printnightmare Cve-2021-34527 | Unspecified | 3 | PrintNightmare (CVE-2021-34527) is a significant software vulnerability that was identified and reported in 2021. It is a flaw in the design or implementation of Microsoft's Windows Print Spooler service, which can be exploited for local and Windows Active Domain privilege escalation. This allows at |
Zerologon | Unspecified | 1 | Zerologon is a critical vulnerability (CVE-2020-1472) found within Microsoft's Netlogon Remote Protocol, impacting all versions of Windows Server OS from 2008 onwards. This flaw in software design or implementation allows attackers to bypass authentication mechanisms and change computer passwords wi |
Proxylogon | Unspecified | 1 | ProxyLogon is a notable software vulnerability that surfaced in the cybersecurity landscape. It was part of an exploit chain, including CVE-2021-26855, a server-side request forgery (SSRF) vulnerability in Microsoft Exchange Server. This flaw allowed attackers to bypass authentication mechanisms and |
Follina | Unspecified | 1 | Follina, also known as CVE-2022-30190, is a notable software vulnerability that was discovered and exploited in the first half of 2022. This flaw, found in the Microsoft Windows Support Diagnostic Tool (MSDT), was weaponized by TA413, a cyber threat actor group with suspected ties to China. The grou |
CVE-2021-1675 | Unspecified | 1 | None |
CVE-2022-38028 | Unspecified | 1 | None |
CVE-2022-30190 | Unspecified | 1 | CVE-2022-30190, also known as the "Follina" vulnerability, is a high-risk software flaw in the Microsoft Support Diagnostic Tool that allows for remote code execution. This 0-day vulnerability was disclosed in May 2022 and has since been exploited by threat actors, including TA413, who weaponized it |
Source | CreatedAt | Title |
---|---|---|
CISA | 3 months ago | #StopRansomware: Black Basta | CISA |
InfoSecurity-magazine | 3 months ago | Russian APT28 Group in New “GooseEgg” Hacking Campaign |
MITRE | 7 months ago | Trickbot Rising — Gang Doubles Down on Infection Efforts to Amass Network Footholds |
CERT-EU | a year ago | Windwos Print Spooler 权限提升漏洞 - FreeBuf网络安全行业门户 |
Fortinet | a year ago | Ransomware Roundup - Black Basta | FortiGuard Labs |
CERT-EU | a year ago | Top Threatening Network Vulnerability in 2023 |
MITRE | a year ago | Bumblebee: New Loader Rapidly Assuming Central Position in Cyber-crime Ecosystem |
CERT-EU | a year ago | X-Force Prevents Zero Day from Going Anywhere |
CERT-EU | a year ago | Cybersecurity threatscape: year 2021 in review |