FireEye’s Stolen Tools and the Exposures They Reveal
US Cybersecurity firm FireEye was attacked by a nation-state group who was able to steal their pen-testing tools and exploit kits. The ramification of such a breach is monumental because FireEye’s Red Team tools are used to assess evolving zero-day security threats...
From Behind a Great Wall these Vulnerabilities Open Doors
Read about what we learned from the NSA alert about Chinese State-Sponsored Actors Exploit Publicly Known Vulnerabilities. The top 25 vulnerabilities listed in the security advisory were analyzed for interesting correlations and security take-aways. Here...
Ryuk is Raising the Temperature in Healthcare
Ransomware attacks on hospitals and health care companies are growing deadlier by the day. August 2020 saw the first recorded fatality in Germany when a ransomware attack on a hospital resulted in a patient's death because the facility had to shut-down and...
CVE-2020-1472 Zerologon Exploit Now Available
Yesterday, (14 Sep 2020) RiskSense announced that we had written and released a weaponized exploit for CVE-2020-1472, also known as “Zerologon”. We do this of course, to help the security community. If you think about it, public exploits become useless over...
Don’t Forget the Firmware
This past week Cisco discovered zero-day attacks being used in the wild against its Cisco IOS XR products. The last few months have shown a trend to keep network administrators busy outside of the new routine of work-from-home woes. Critical security...
System Filters
A couple of years ago, RiskSense provided a saved quick filter for a customer who was curious about a particular set of CVEs. RiskSense quickly realized the value in single-click system filters as they help clients understand the high severity...
Is Open Source Your Risk-Based Blind Spot?
Open source software has become an integral part of virtually every aspect of modern applications and application development. It’s currently estimated that open source code makes up between 80% and 90% of the code in modern applications. Likewise, open...
Blast from the Past! Working from home leads to uptick in Remote Access Vulnerability Trends
Back in May of 2019, one of the most trending and high-profile vulnerabilities of the decade, CVE-2019-0708 codenamed BlueKeep, was publicly disclosed. Then in August of 2019, BlueKeep received a second wave of hype when a second disclosure of similar...
While Zoom is in the News, Other Vendors are Also Plagued with Vulnerabilities
The first few months of 2020 had the world thrust apart because of COVID-19. In response, organizations and individuals alike turned to one technology more than any other: teleconferencing software. During the first three weeks of April 2020, Zoom saw a...
DHS Warnings Bring Light to Surging VPN Vulnerabilities
Since the start of 2020, virtual private networks (VPNs) have spiked in usage by 33% due to the flood of people forced to work from home. With this increase in VPN usage also comes a wave of new research into VPN vulnerabilities. One vulnerability,...