Home Artists Posts Import Register

Downloads

Content

ThreatWire Totem Board - Limited Edition! - https://snubsie.com/threatwire-products/tw-totem

Shop ThreatWire Merch on Teespring! - https://morsecode.creator-spring.com/

Support ThreatWire! https://www.patreon.com/shannonmorse

Follow Shannon on Social Media: https://snubsie.com/links

What is a Cyber Trust Mark?, ColdFusion is under attack, and Microsoft Exchange suffers vulnerabilities! All that coming up now on ThreatWire.

#threatwire #hak5

ThreatWire by Shannon Morse is a weekly news journalism show covering cybersecurity topics for network admins, information security professionals, and consumers.

Watch this on youtube: https://youtu.be/yoVkxZ8JRcQ

Chapters:

00:00 What Is The Cyber Trust Mark?

04:08 ColdFusion Under Attack

07:21 Microsoft Exchange Vulns

Links:

https://www.bleepingcomputer.com/news/security/us-preparing-cyber-trust-mark-for-more-secure-smart-devices/

https://arstechnica.com/information-technology/2023/07/the-cyber-trust-mark-is-a-voluntary-iot-label-coming-in-2024-what-does-it-mean/

https://www.whitehouse.gov/briefing-room/statements-releases/2023/07/18/biden-harris-administration-announces-cybersecurity-labeling-program-for-smart-devices-to-protect-american-consumers/

https://www.fcc.gov/cybersecurity-certification-mark

https://www.cylab.cmu.edu/news/2023/07/18-iot-labeling-system.html

https://docs.fcc.gov/public/attachments/DOC-395185A1.pdf

https://www.rapid7.com/blog/post/2023/07/17/etr-active-exploitation-of-multiple-adobe-coldfusion-vulnerabilities/

https://www.bleepingcomputer.com/news/security/critical-coldfusion-flaws-exploited-in-attacks-to-drop-webshells/

https://helpx.adobe.com/security/products/coldfusion/apsb23-40.html

https://webcache.googleusercontent.com/search?q=cache:ZY3xxeBiSEoJ:https://blog.projectdiscovery.io/adobe-coldfusion-rce/&cd=10&hl=en&ct=clnk&gl=us

https://threatprotect.qualys.com/2023/07/18/adobe-coldfusion-vulnerabilities-exploited-in-the-attacks-in-dropping-webshell-cve-2023-29298-cve-2023-29300-and-cve-2023-38203/

https://arstechnica.com/security/2023/07/vulnerabilities-in-adobe-coldfusion-and-citrix-netscaler-are-under-active-exploitation/

https://www.bleepingcomputer.com/news/security/adobe-fixes-patch-bypass-for-exploited-coldfusion-cve-2023-29298-flaw/

https://thehackernews.com/2023/07/adobe-rolls-out-new-patches-for.html

https://www.cisa.gov/news-events/alerts/2023/07/20/cisa-adds-two-known-exploited-vulnerabilities-catalog

https://www.bleepingcomputer.com/news/security/microsoft-hackers-turn-exchange-servers-into-malware-control-centers/

https://twitter.com/msftsecintel/status/1681695399084539908?s=12&t=tDVP3ULf1Ou5szxCQAKqjA

https://cert.gov.ua/article/5213167

https://www.helpnetsecurity.com/2023/07/20/turla-compromised-microsoft-exchange/

https://www.virustotal.com/gui/file/ba2c8df04bcba5c3cfd343a59d8b59b76779e6c27eb27b7ac73ded97e08f0f39

https://www.bleepingcomputer.com/news/security/stolen-microsoft-key-offered-widespread-access-to-microsoft-cloud-services/

https://www.bleepingcomputer.com/news/microsoft/microsoft-expands-access-to-cloud-logging-data-for-free-after-exchange-hacks/

https://www.microsoft.com/en-us/security/blog/2023/07/19/expanding-cloud-logging-to-give-customers-deeper-security-visibility/

Comments

No comments found for this post.