Staying Ahead of CVE-2022-30190 (Follina) 

Executive Summary On May 27th 2022, @nao_sec identified a malicious Microsoft Word document using a “ms-msdt” protocol scheme for arbitrary code execution. As the industry continues to identify novel ways to abuse this ability over the weekend, Microsoft assigned it as CVE-2022-30190. Similar to what we observed with Log4j, the methods of execution and outcomes …

Staying Ahead of CVE-2022-30190 (Follina)  Read More »

OpenSSL 3 Critical Vulnerability | What Do Organizations Need To Do Now?

Last week, the OpenSSL project team announced the release of OpenSSL version 3.0.7, which was made available on Tuesday, November 1st. The update is a security fix for two vulnerabilities in OpenSSL 3.0.x, and developers and organizations are being urged to ensure that they patch any instances of OpenSSL 3 in their software stack as …

OpenSSL 3 Critical Vulnerability | What Do Organizations Need To Do Now? Read More »

SmoothOperator | Ongoing Campaign Trojanizes 3CXDesktopApp in Supply Chain Attack

By Juan Andres Guerrero-Saade, Asaf Gilboa, David Acs, James Haughom, Phil Stokes & SentinelLabs Executive Summary As of Mar 22, 2023 SentinelOne began to see a spike in behavioral detections of the 3CXDesktopApp, a popular voice and video conferencing software product categorized as a Private Automatic Branch Exchange (PABX) platform. Behavioral detections prevented these trojanized …

SmoothOperator | Ongoing Campaign Trojanizes 3CXDesktopApp in Supply Chain Attack Read More »