ID | Votes | Profile Description |
---|
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
ID | Type | Votes | Profile Description |
---|---|---|---|
BlackTech | Unspecified | 1 | BlackTech is a threat actor, or a group responsible for carrying out malicious cyber activities. Known for its links to China, BlackTech focuses on gathering intelligence from technology and government organizations, predominantly in the Asia-Pacific region. This group has shown a high degree of sop |
ID | Type | Votes | Profile Description |
---|---|---|---|
Log4Shell | Unspecified | 2 | Log4Shell is a software vulnerability, specifically a flaw in the design or implementation of the popular Java logging library, Log4j. Identified as CVE-2021-44228, this vulnerability allows an attacker to remotely execute arbitrary code, often leading to full system compromise. Advanced Persistent |
CVE-2022-22954 | Unspecified | 2 | CVE-2022-22954 is a significant software vulnerability that affects VMware's Workspace One Access and Identity Manager. This flaw in the software design or implementation allows for remote code execution, providing an attacker with the ability to execute arbitrary commands on the affected system. Ov |
Proxyshell | Unspecified | 1 | ProxyShell is a critical vulnerability affecting Microsoft Exchange email servers. Identified as CVE-2021-34473, it is a flaw in software design or implementation that can be exploited by attackers to gain unauthorized access to systems. The vulnerability was actively exploited by threat actors, cau |
Follina | Unspecified | 1 | Follina, also known as CVE-2022-30190, is a notable software vulnerability that was discovered and exploited in the first half of 2022. This flaw, found in the Microsoft Windows Support Diagnostic Tool (MSDT), was weaponized by TA413, a cyber threat actor group with suspected ties to China. The grou |
CVE-2021-44228 | Unspecified | 1 | CVE-2021-44228, also known as the Log4j vulnerability, is a software flaw found in Apache Log4j, a widely used logging utility. Despite multiple attempts by Advanced Persistent Threat (APT) actors to exploit this vulnerability in the ServiceDesk system, these efforts were unsuccessful. However, it b |
CVE-2022-22960 | Unspecified | 1 | None |
Source | CreatedAt | Title |
---|---|---|
CERT-EU | 5 months ago | Sensor Intel Series: Top CVEs in December 2023 |
CERT-EU | 7 months ago | Infographic: A History of Network Device Threats and What Lies Ahead |
CERT-EU | 7 months ago | Infographic: A History of Network Device Threats and What Lies Ahead | #ransomware | #cybercrime | National Cyber Security Consulting |
CERT-EU | 8 months ago | Sensor Intel Series: Top CVEs in October 2023 |
CERT-EU | 9 months ago | BIG-IP Vulnerability Alert: Remote Code Execution Risk |
CERT-EU | 9 months ago | CVE-2023-46747: Severe Flaw in Big-IP Causes Remote Code Execution |
CERT-EU | 9 months ago | F5 Issues Warning: BIG-IP Vulnerability Allows Remote Code Execution |
CERT-EU | 10 months ago | Sensor Intel Series: Top CVEs in August 2023 | F5 Labs |
Malwarebytes | a year ago | 2022's most routinely exploited vulnerabilities—history repeats |
CERT-EU | a year ago | Unmasking the top exploited vulnerabilities of 2022 – GIXtools |
BankInfoSecurity | a year ago | Patching Conundrum: 5-Year Old Flaw Again Tops Most-Hit List |
CERT-EU | a year ago | Five Eyes Agencies Call Attention to Most Frequently Exploited Vulnerabilities |
CERT-EU | a year ago | FBI, CISA, and NSA reveal top exploited vulnerabilities of 2022 |
CERT-EU | a year ago | Most exploited cyber vulnerabilities of 2022 revealed |
BankInfoSecurity | a year ago | Patching Conundrum: 4-Year Old Flaw Again Tops Most-Hit List |
Securityaffairs | a year ago | CISA, FBI, and NSA published the list of 12 most exploited vulnerabilities of 2022 |
CERT-EU | a year ago | FBI, CISA, and NSA reveal top exploited vulnerabilities of 2022 |
CISA | a year ago | 2022 Top Routinely Exploited Vulnerabilities | CISA |
Fortinet | a year ago | Ransomware Roundup - Cl0p | FortiGuard Labs |
MITRE | a year ago | Windows Commands Abused by Attackers - JPCERT/CC Eyes |