On 5/27/22 security research team, Nao_sec identified a malicious Word document in the wild, that appeared to be leveraging the “MS-MSDT” (Microsoft Support Diagnostic Tool) protocol to execute Powershell code. This was done through an external reference in the XML of the Word doc to a malicious HTML file hosted by the threat actor. The malicious HTML file then uses JavaScript to rewrite the URL to call the Microsoft Support Diagnostic Tool via the......
Read More
Log4Shell Vulnerability
Summary: On Dec. 9, 2021, Proof of Concept exploitation code for the remote code execution (RCE) vulnerability (CVE-2021-44228) in...
Read MoreThe Top 4 Reasons Why Organizations Like Yours Leverage Vertek for Cybersecurity
Today’s cyber criminals have learned to capitalize on vulnerabilities created by hybrid workforces and understaffed IT and security departments....
Read MoreCritical PrintNightmare Vulnerability Patches
Summary: Window’s Print Spooler is run by default on all supported Windows operating system versions as it is a...
Read MoreKaseya VSA Attack Delivers REvil Ransomware
Summary: On 07/02/2021, Kaseya disclosed an ongoing attack exploiting on-premise Kaseya VSA servers, along with an advisory to their...
Read MoreHAFNIUM: Exchange Zero Days Actively Exploited by APT Group
Summary: On 3/2/21, security researchers at Volexity released a blog with their findings following their discovery of four new...
Read More