Summary: Back at the start of August 2022, members of GTSC came across an attack where Microsoft Exchange was actively being targeted. They were able to verify that the attack was leveraging a 0-day vulnerability in Exchange which ultimately led to a RCE attack. Their initial analysis and work with ZDI (Zero Day Initiative) proved that this attack was leveraging two vulnerabilities, a SSRF vulnerability in Exchange (CVE-2022-41040) and a RCE vulnerability in PowerShell......
Read More
Follina: Microsoft Office Zero Day Vulnerability
On 5/27/22 security research team, Nao_sec identified a malicious Word document in the wild, that appeared to be leveraging...
Read MoreLog4Shell Vulnerability
Summary: On Dec. 9, 2021, Proof of Concept exploitation code for the remote code execution (RCE) vulnerability (CVE-2021-44228) in...
Read MoreThe Top 4 Reasons Why Organizations Like Yours Leverage Vertek for Cybersecurity
Today’s cyber criminals have learned to capitalize on vulnerabilities created by hybrid workforces and understaffed IT and security departments....
Read MoreCritical PrintNightmare Vulnerability Patches
Summary: Window’s Print Spooler is run by default on all supported Windows operating system versions as it is a...
Read MoreKaseya VSA Attack Delivers REvil Ransomware
Summary: On 07/02/2021, Kaseya disclosed an ongoing attack exploiting on-premise Kaseya VSA servers, along with an advisory to their...
Read MoreHAFNIUM: Exchange Zero Days Actively Exploited by APT Group
Summary: On 3/2/21, security researchers at Volexity released a blog with their findings following their discovery of four new...
Read More