K52341555: Samba vulnerability CVE-2022-3592

Samba vulnerability CVE-2022-3592 Security Advisory Security Advisory Description ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing ... More info: https://support.f5.com/csp/article/K52341555?utm_source=f5support&utm_medium=RSS

K44454157: Expat vulnerability CVE-2022-40674

Expat vulnerability CVE-2022-40674 Security Advisory Security Advisory Description libexpat before 2.4.9 has a use-after-free in the doContent function in xmlparse.c. (CVE-2022-40674) Impact An ... More info: https://support.f5.com/csp/article/K44454157?utm_source=f5support&utm_medium=RSS

Threat Analysis: Active C2 Discovery Using Protocol Emulation Part3 (ShadowPad)

ShadowPad is a modular malware platform privately shared with multiple PRC-linked threat actors since 2015. According to SentinelOne, ShadowPad is highly likely the successor to PlugX. Due to its prevalence in the cyber espionage field, the VMware Threat Analysis Unit (TAU) was motivated to analyze the command and control (C2) protocol to discover active ShadowPad … ContinuedThe post Threat Analysis: Active C2 Discovery Using Protocol Emulation Part3 (ShadowPad) appeared first on VMware More info: https://blogs.vmware.com/security/2022/10/threat-analysis-active-c2-discovery-using-protocol-emulation-part3-shadowpad.html?utm_source=rss&utm_medium=rss&utm_campaign=threat-analysis-active-c2-discovery-using-protocol-emulation-part3-shadowpad

K30671731: Apache Shiro vulnerability CVE-2022-40664

Apache Shiro vulnerability CVE-2022-40664 Security Advisory Security Advisory Description Apache Shiro before 1.10.0, Authentication Bypass Vulnerability in Shiro when forwarding or including via ... More info: https://support.f5.com/csp/article/K30671731?utm_source=f5support&utm_medium=RSS

K11601010: Intel Processor vulnerability CVE-2021-33149

Intel Processor vulnerability CVE-2021-33149 Security Advisory Security Advisory Description Observable behavioral discrepancy in some Intel(R) Processors may allow an authorized user to ... More info: https://support.f5.com/csp/article/K11601010?utm_source=f5support&utm_medium=RSS

See Yourself in Cyber: 5 Questions with Amelina Ishak

In celebration of this year’s Cybersecurity Awareness Month theme – See Yourself in Cyber – we are spotlighting VMware security pros to ask them five questions about their career path. Amelina Ishak is a detection and response analyst at VMware. Amelina’s current role on the DART team involves global security monitoring and investigation of suspicious … ContinuedThe post See Yourself in Cyber: 5 Questions with Amelina Ishak appeared first on VMware Security Blog. More info: https://blogs.vmware.com/security/2022/10/see-yourself-in-cyber-5-questions-with-amelina-ishak.html?utm_source=rss&utm_medium=rss&utm_campaign=see-yourself-in-cyber-5-questions-with-amelina-ishak

K31902105: OpenSSH vulnerability CVE-2016-20012

OpenSSH vulnerability CVE-2016-20012 Security Advisory Security Advisory Description ** DISPUTED ** OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of ... More info: https://support.f5.com/csp/article/K31902105?utm_source=f5support&utm_medium=RSS
Translate »