Malware Monitor by Morphisec | March 5th

Malware Monitor by Morphisec | March 5th

Welcome back to the Morphisec Malware Monitor.?We guarantee you’ll find this edition insightful.?

Industry Headline Scan?

Morphisec’s Ransomware-Free Guarantee: Setting a New Standard for Anti-Ransomware Protection?– Morphisec?

Morphisec is setting a new benchmark with its Anti-Ransomware Assurance Suite and the recently launched Ransomware-Free Guarantee, cementing its position as the #1 trusted, best-of-breed Anti-Ransomware Protection solution on the market.?

Under this program, if a ransomware breach occurs despite the use of Morphisec’s solutions, the company offers:??

  • A Full Refund: 100% of the customer’s subscription fees.??

  • Incident Response Support: Expert assistance from Morphisec’s internal Incident Response team to investigate, contain, and manage the ransomware breach, valued up to the contracted limit.?

Cisco, Hitachi, Microsoft, and Progress Flaws Actively Exploited—CISA Sounds Alarm?– The Hacker News?

On Monday, CISA added five security flaws impacting software from Cisco, Hitachi Vantara, Microsoft Windows, and Progress WhatsUp Gold to its Known Exploited Vulnerabilities (KEV) catalog?

The list of vulnerabilities is as follows -?

  • CVE-2023-20118 (CVSS score: 6.5) - A command injection vulnerability in the web-based management interface of Cisco Small Business RV Series routers that allows an authenticated, remote attacker to gain root-level privileges and access unauthorized data (Unpatched due to the routers reaching end-of-life status)?

  • CVE-2022-43939 (CVSS score: 8.6) - An authorization bypass vulnerability in Hitachi Vantara Pentaho BA Server that stems from the use of non-canonical URL paths for authorization decisions (Fixed in August 2024 with versions 9.3.0.2 and 9.4.0.1)?

  • CVE-2022-43769 (CVSS score: 8.8) - A special element injection vulnerability in Hitachi Vantara Pentaho BA Server that allows an attacker to inject Spring templates into properties files, allowing for arbitrary command execution (Fixed in August 2024 with versions 9.3.0.2 and 9.4.0.1)?

  • CVE-2018-8639 (CVSS score: 7.8) - An improper resource shutdown or release vulnerability in Microsoft Windows Win32k that allows for local, authenticated privilege escalation, and running arbitrary code in kernel mode (Fixed in December 2018)?

  • CVE-2024-4885 (CVSS score: 9.8) - A path traversal vulnerability in Progress WhatsUp Gold that allows an unauthenticated attacker to achieve remote code execution (Fixed in version 2023.1.3 in June 2024)?

Congratulations to Arnold and Michael!?

Two members of the Morphisec research team have been recognized as Most Valuable?

Security Researchers by Microsoft: CTO Michael Gorelik and Malware Researcher Arnold Osipov. These two have been delivering constant insights into Microsoft Office Remote Code Execution Vulnerabilities over the last year, and their award is well-deserved.?

Next up for the dynamic duo: Microsoft Zero-Day Quest!?

Morphisec Expert Insights?

Our resident Gartner Veteran Brad LaPorte has been busy, so we have not one, but two webinars for you!?

First, Brad recently sat down with Enterprise Management 360 for an expert panel focused on the future of cybersecurity. This can’t-miss discussion features unique insights from some of the people helping shape the future of the industry. Listen here!?

Next: Brad is leading a session with Morphisec focused on actionable predictions for 2025 and beyond! Make sure to clear your calendar at 11 AM ET on March 19th, as we cover 13 predictions for 2025 ranging from sure-things to bold but not impossible. RSVP now!?

Closing Notes?

  • Be sure to subscribe to the Malware Monitor to get notified whenever we share more weekly headlines, insights, and data on dangerous ransomware attacks!?

?

要查看或添加评论,请登录

Morphisec的更多文章