Summary: On August 11th Microsoft published a security advisory for the critical vulnerability CVE-2020-1472, dubbed “Zerologon”. The vulnerability was discovered by security researchers at Secura who published a whitepaper with their findings, which can be found here. This vulnerability affects all versions of Windows and allows an attacker on the network to escalate to domain administrator privileges, if exploited. This is done by exploiting an insecure implementation of AES cryptography in Microsoft’s Netlogon protocol.......
Read More
Citrix ADC/NetScaler RCE CVE-2019-19781
Summary: On December 17th Citrix published a security bulletin for a recently discovered critical vulnerability in their Citrix ADC...
Read MoreManaged Threat Intelligence: Managed SIEM & SOCaaS Powered by Vertek in 90 seconds
Quickly learn why your organization needs MTI powered by Vertek, and how it will protect you and your customers!...
Read MoreA Vertek Threat Intelligence Analyst Identifies Trik Spam Botnet Leaks 43 Million Email Addresses
A Threat Intelligence Analyst on Vertek’s Cybersecurity team recently discovered a massive spam recipient list from a bad threat...
Read MoreMicrosoft Patches IE Zero-Day Dubbed “Double Kill”
Threat Summary On May 8th 2018 , Microsoft released critical security updates to patch a Remote Code Execution (RCE)...
Read MoreMicrosoft Patches 17 year old MS Office Memory Corruption Flaw
Threat Summary This blog is regarding a memory corruption vulnerability in the equation editor of Microsoft Office that affects...
Read MoreDetection and Prevention of Bad Rabbit Ransomware
Summary There have been numerous reports of a new ransomware outbreak called BadRabbit, which started to spread via “drive-by”...
Read MoreMalware distributed via MS Office DDE “feature” — no macros required!
What is DDE? DDE (Dynamic Data Exchange) is a protocol used to transfer data between applications and provides the...
Read MoreLocky ransomware switches up extension with asasin variant
Email campaigns pushing Locky ransomware are still very prevalent and continue to evolve. Encrypted files are now appended with...
Read MoreBrowser-based Cryptocurrency Mining Ramping Up
Our SOC has observed several cases of browser mining (also referred to as “cryptojacking”) as of late where javascript...
Read More