
Category: Threat Intel Reports
-
What Should the US Do About Salt Typhoon?
 [Alexander Culafi,…
-
U.S. CISA adds Linux Kernel flaws to its Known Exploited Vulnerabilities catalog
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Linux Kernel flaws to its Known Exploited Vulnerabilities catalog.————————————————————————————————————————————The U.S. Cybersecurity and…
-
HPE security advisory (AV25-205)
**Serial number:** AV25-205 **Date:**April 10, 2025On April 9, 2025, HPE published a security advisory to address vulnerabilities in the following…
-
Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution===================================================================================#### MS-ISAC ADVISORY NUMBER:2025-039 #### DATE(S) ISSUED:04/08/2025 #### OVERVIEW:Multiple vulnerabilities…
-
Multiple Vulnerabilities in Fortinet Products Could Allow for Remote Code Execution
Multiple Vulnerabilities in Fortinet Products Could Allow for Remote Code Execution===================================================================================#### MS-ISAC ADVISORY NUMBER:2025-021 #### DATE(S) ISSUED:03/11/2025 #### OVERVIEW:Multiple vulnerabilities…
-
Drupal security advisory (AV25-204)
**Serial number:** AV25-204 **Date:**April 10, 2025On April 9, 2025, Drupal published security advisories to address vulnerabilities in multiple products. Included…
-
A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution
A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution=========================================================================#### MS-ISAC ADVISORY NUMBER:2025-038 #### DATE(S) ISSUED:04/08/2025 #### OVERVIEW:A vulnerability…
-
Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution===================================================================================#### MS-ISAC ADVISORY NUMBER:2025-023 #### DATE(S) ISSUED:03/11/2025 #### OVERVIEW:Multiple vulnerabilities…
-
Amazon Gift Card Email Hooks Microsoft Credentials
By: Lorenzo Sampang, Cofense Phishing Defense Center—————————————————-In today’s day and age, e-gift cards have become a popular substitute for traditional…
-
Multiple Vulnerabilities in Ivanti Endpoint Manager Could Allow for Remote Code Execution
Multiple Vulnerabilities in Ivanti Endpoint Manager Could Allow for Remote Code Execution=========================================================================================#### MS-ISAC ADVISORY NUMBER:2025-037 #### DATE(S) ISSUED:04/08/2025 #### OVERVIEW:Multiple…

