Netizen Blog and News
The Netizen team sharing expertise, insights and useful information in cybersecurity, compliance, and software assurance.
Category: Threat Intelligence
-

Functioning as a Telegram bot-based toolkit, Telekopye, an e-commerce threat vector, streamlines the execution of advanced phishing operations. It enables perpetrators, referred to as ‘Neanderthals’, to deploy a range of tactics including spear-phishing through crafted HTML pages, domain spoofing, and social engineering via SMS and email phishing campaigns. This toolkit marks a significant escalation in…
-

Security vulnerabilities are a constant threat to businesses. Netizen’s Security Operations Center has identified five critical vulnerabilities from November that require immediate attention. These include privilege escalation, path traversal, SQL injection, CSRF, and local privilege escalation issues in various software. Netizen offers advanced solutions and services to help businesses enhance their cybersecurity posture.
-

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has taken a significant step towards enhancing the cybersecurity posture of the nation’s critical infrastructure sectors. The agency has announced the launch of an innovative pilot program, aimed at extending cutting-edge cybersecurity shared services to critical infrastructure entities, especially those most in need of such support. This…
-

In a landmark operation in early 2023, the FBI, along with German and Dutch authorities, dismantled Hive, a prolific ransomware group. This collective had extorted over $100 million since June 2021, targeting a wide range of sectors. The FBI’s operation infiltrated Hive’s network over seven months, obtaining decryption keys for over 300 recent victims and…
-

The discovery of CVE-2023-22518 presents a significant concern for organizations using Confluence Data Center and Server. Atlassian has granted the vulnerability a 10/10 CVSS score based on an internal assessment, however the NVD has yet to provide a score. This is the second major vulnerability discovered in Atlassian Confluence over the past few weeks; CVE-2023-22515,…
-

The phrase “deepfake”, an amalgamation of the words “deep learning” and “fake,” is defined as any method of synthetic media, images, or video, that is manipulated in order to create a piece of media that conveys a different message. Using machine learning algorithms, malicious actors compile images and sounds from various sources, creating hoax videos…
-

Security vulnerabilities are a common occurrence in managing any business’s organizational security. The prompt patching and remediation of any new vulnerabilities are critical to reducing the outside attack surface. Netizen’s Security Operations Center (SOC) has compiled five vulnerabilities from October that should be immediately patched or addressed if present in your environment. Detailed writeups below:…
-
Overview: Phish Tale of the Week Often times phishing campaigns, created by malicious actors, target users by utilizing social engineering. For example, in this text message, the actors are appearing as USPS, the United States Postal Service, and informing you that action needs to be taken regarding your delivery. The message politely explains that “USPS”…
-

Cisco IOS XE Software, a critical component of many Cisco network devices, has recently been found to have vulnerabilities in its Web UI feature. These vulnerabilities, if exploited, can provide attackers with significant access and control over affected devices. The vulnerabilities are particularly concerning for systems where the web UI feature is activated in the…
-

The highly exploitable CVE-2023-4966 vulnerability in Citrix NetScaler at first glance proves incredibly dangerous to NetScaler environments. While initial analyses have highlighted the potential risk and exploitation scenarios, a deeper technical examination is essential to fully comprehend its intricacies and the subsequent steps for mitigation. Affected Products and Versions: Affected Product Affected Version Fixed Version…