10/07

CVE-2022-41352 | AttackerKB

https://attackerkb.com/topics/1DDTvUNFzH/cve-2022-41352/rapid7-analysis
CVE-2022-41352 | AttackerKB

Fortinet warns admins to patch critical auth bypass bug immediately

https://www.bleepingcomputer.com/news/security/fortinet-warns-admins-to-patch-critical-auth-bypass-bug-immediately/
Fortinet warns admins to patch critical auth bypass bug immediately

FortiOS Release Notes | FortiGate / FortiOS 7.2.2 | Fortinet Documentation Library

https://docs.fortinet.com/document/fortigate/7.2.2/fortios-release-notes/760203/introduction-and-supported-models
FortiOS Release Notes | FortiGate / FortiOS 7.2.2 | Fortinet Documentation Library

NSA, CISA, FBI Reveal Top CVEs Exploited by Chinese State-Sponsored Actors > National Security Agency/Central Security Service > Press Release View

https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3181261/nsa-cisa-fbi-reveal-top-cves-exploited-by-chinese-state-sponsored-actors/
NSA, CISA, FBI Reveal Top CVEs Exploited by Chinese State-Sponsored Actors > National Security Agency/Central Security Service > Press Release View

Joint_CSA_Top_CVEs_Exploited_by_PRC_cyber_actors_.PDF

https://media.defense.gov/2022/Oct/06/2003092365/-1/-1/0/Joint_CSA_Top_CVEs_Exploited_by_PRC_cyber_actors_.PDF
Joint_CSA_Top_CVEs_Exploited_by_PRC_cyber_actors_.PDF

Hacker steals $566 million worth of crypto from Binance Bridge

https://www.bleepingcomputer.com/news/security/hacker-steals-566-million-worth-of-crypto-from-binance-bridge/
Hacker steals $566 million worth of crypto from Binance Bridge

GitHub - med0x2e/vba2clr: Running .NET from VBA

https://github.com/med0x2e/vba2clr
GitHub - med0x2e/vba2clr: Running .NET from VBA

Hackers Can Use 'App Mode' in Chromium Browsers' for Stealth Phishing Attacks

https://thehackernews.com/2022/10/hackers-can-use-app-mode-in-chromium.html
Hackers Can Use 'App Mode' in Chromium Browsers' for Stealth Phishing Attacks

VirusTotal - Search - crowdsourced_yara_rule:000b20879c|MAL_QBot_HTML_Smuggling_Indicators_Oct22_1

https://www.virustotal.com/gui/search/crowdsourced_yara_rule%253A000b20879c%257CMAL_QBot_HTML_Smuggling_Indicators_Oct22_1/files
VirusTotal - Search - crowdsourced_yara_rule:000b20879c|MAL_QBot_HTML_Smuggling_Indicators_Oct22_1

abuse-of-legitimate-security-tools-and-the-hph.pdf

https://www.hhs.gov/sites/default/files/abuse-of-legitimate-security-tools-and-the-hph.pdf
abuse-of-legitimate-security-tools-and-the-hph.pdf

BlackByte Ransomware Abuses Vulnerable Windows Driver to Disable Security Solutions

https://thehackernews.com/2022/10/blackbyte-ransomware-abuses-vulnerable.html
BlackByte Ransomware Abuses Vulnerable Windows Driver to Disable Security Solutions

ARM64 support for SyscallDumper · daem0nc0re/AtomicSyscall@a21c88c · GitHub

https://github.com/daem0nc0re/AtomicSyscall/commit/a21c88c53a0d117d60ee17a0eae717e7680b7db2
ARM64 support for SyscallDumper · daem0nc0re/AtomicSyscall@a21c88c · GitHub

Melting the DNS Iceberg: Taking over your infrastructure Kaminsky style

https://sec-consult.com/blog/detail/melting-the-dns-iceberg-taking-over-your-infrastructure-kaminsky-style/
Melting the DNS Iceberg: Taking over your infrastructure Kaminsky style

Putin confronted by insider over Ukraine war, U.S. intelligence finds - The Washington Post

https://www.washingtonpost.com/national-security/2022/10/07/putin-inner-circle-dissent/
Putin confronted by insider over Ukraine war, U.S. intelligence finds - The Washington Post