M.A. Polce

Security Updates

Security Updates

An M.A. Polce IT and Cybersecurity branded graphic that indicates the associated post content is a cybersecurity update and/or threat alert

Apple Releases Security Updates for Multiple Products

Overview Apple released new security updates corresponding to vulnerabilities found in various products on January 23rd, 2023. Any device with a vulnerability is at risk of an attacker gaining access.…
An M.A. Polce IT and Cybersecurity branded graphic that indicates the associated post content is a cybersecurity update and/or threat alert

MedusaLocker Ransomware – New Techniques, Tactics and Procedures

Overview MedusaLocker has been using new techniques and tactics of ransomware by targeting any unpatched VPNs for initial access. This is done using the scheduled task “svhost” to encrypt machines…
An M.A. Polce IT and Cybersecurity branded graphic that indicates the associated post content is a cybersecurity update and/or threat alert

Attackers Exploit Critical Flaw in Many Zoho ManageEngine Products

Overview There are new vulnerabilities discovered on Zoho ManageEngine products related to CVE-2022-47966, which allow for unauthenticated RCE – Remote Code Execution. This is the effect of an outdated Apache…
An M.A. Polce IT and Cybersecurity branded graphic that indicates the associated post content is a cybersecurity update and/or threat alert

NIST Welcomes Public Input on CSF Concept Paper

Overview The National Institute of Standards and Technology (NIST) has released the “Cybersecurity Framework 2.0 Concept Paper: Potential Significant Updates to the Cybersecurity Framework,” outlining considered changes to the Cybersecurity…
An M.A. Polce IT and Cybersecurity branded graphic that indicates the associated post content is a cybersecurity update and/or threat alert

Malvertising via Google Ads Used to Spread Rhadamanthys Stealer

Overview The Rhadamanthys Stealer is a malvertising campaign, spreading across the internet via Google Ads which redirect users to trojanized versions of installers for many popular software packages (ex from…
An M.A. Polce IT and Cybersecurity branded graphic that indicates the associated post content is a cybersecurity update and/or threat alert

Fortinet Analysis of FG-IR-22-398 – FortiOS – Heap-based Buffer Overflow in SSLVPNd

Overview Fortinet published critical advisory FG-IR-22-398 / CVE-2022-42475 on Dec 12, 2022. The advisory has since been updated. On January 11, 2023, the company issued a write-up detailing its initial…
An M.A. Polce IT and Cybersecurity branded graphic that indicates the associated post content is a cybersecurity update and/or threat alert

Identified Cisco Vulnerabilities for Small Business Routers

Overview On January 11, 2023, Cisco security published an advisory for multiple vulnerabilities in the web-based management interface that exists in some of their SMB routers. These vulnerabilities could allow…
An M.A. Polce IT and Cybersecurity branded graphic that indicates the associated post content is a cybersecurity update and/or threat alert

Flipper Security Testing Tool Abuse Threatens both Physical Security and Cybersecurity

Overview Flipper Zero is a portable electronic multi-functional pen-testing tool that came out in 2020. It combines hardware tools for hacking with custom, open-source software, that aids in hacking or…
An M.A. Polce IT and Cybersecurity branded graphic that indicates the associated post content is a cybersecurity update and/or threat alert

New Linux Malware Uses 30 Plugin Exploits to Backdoor WordPress Sites

Overview Bleeping Computer and other sources reported that a previously unidentified Linux malware has been exploiting vulnerabilities in numerous outdated WordPress plugins and themes through the insertion of malicious JavaScript.…
An M.A. Polce IT and Cybersecurity branded graphic that indicates the associated post content is a cybersecurity update and/or threat alert

Threat Actors Bypass Microsoft Exchange ProxyNotShell Mitigations

Overview In September of 2022, GTSC reported a critical infrastructure attack that took place in August of 2022. The investigation revealed that the threat actor used two zero-day vulnerabilities in…
Join Our Newsletter

Download the "How Strong is Your Cybersecurity Culture?" Checklist!

Name(Required)