Progress Software released an update to its MOVEit file transfer software that patched the previously exposed and exploited CVE-2023-34362. MOVEit exploit update: Progress Software patched two MOVEit vulnerabilities including widely exploited CVE-2023-34362. Numen states, “While this vulnerability seems to be non-exploitable on the Win11 system version, it poses a significant risk to earlier systems.” Microsoft issued a patch for this flaw in May. According to researchers at Varonis, the flaw can allow an attacker “to spoof an extension signature and effectively impersonate any publisher.” Microsoft patched this vulnerability on April 11th.Īttackers are also exploiting a privilege escalation vulnerability affecting win32k, according to researchers at Numen. Threat actors continue to exploit a vulnerability in Microsoft's Visual Studio installer, the Register reports. RomCom resumes its activity in the Russian interest.Īttacks against unpatched Visual Studio and Win 32k continue.Cyber Anarchy Squad claims to have taken down Russian telecom provider's infrastructure.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |