Security Practitioner
SEARCH
CATEGORIES
TAGS
How an Attack Team Hunts New Exploits
Hear directly from Zach Hanley, one of Horizon3.ai's founding engineers as he walks you through a recent critical vulnerability case study. He is joined on this session by Scott Friedman, one of our Sales Engineers.
Introducing the New Face of NodeZero
Hear directly from two of Horizon3.ai's founding engineers - Naveen Sunkavally, Chief Architect, and Rob Alderman, Data Architect - as they walk you through an exclusive tour of NodeZero's latest product refresh.
CVE-2023-27524: Insecure Default Configuration in Apache Superset Leads to Remote Code Execution
April 25, 2023
Apache Superset is an open source data visualization and exploration tool. It has over 50K stars on GitHub, and there are more than 3000 instances of it exposed to the Internet. In our research, we found that a substantial portion of these servers - at least 2000 (two-thirds of all servers) - are running with…
PaperCut CVE-2023-27350 Deep Dive and Indicators of Compromise
April 24, 2023
Overview On 8 March 2023, PaperCut released new versions for their enterprise print management software, which included patches for two vulnerabilities: CVE-2023-27350 and CVE-2023-27351. The PaperCut security advisory details CVE-2023-27350 as a vulnerability that may allow an attacker to achieve remote code execution to compromise the PaperCut application server. PaperCut also details in this advisory…
Veeam Backup and Replication CVE-2023-27532 Deep Dive
March 23, 2023
Introduction Veeam has recently released an advisory for CVE-2023-27532 for Veeam Backup and Replication which allows an unauthenticated user with access to the Veeam backup service (TCP 9401 by default) to request cleartext credentials. Others, including Huntress, Y4er, and CODE WHITE , have provided insight into this vulnerability. In this post, we hope to offer…
Silicon Valley Bank (SVB) Failure Could Signal a Rise in Business E-mail Compromise (BEC)
March 15, 2023
On 10 March, Silicon Valley Bank (SVB) – a popular institution for the venture capital community in the Bay area – failed when venture capitalists (VCs) quickly started to pull money out of the 40-year-old bank, causing federal regulators to step in and shut its doors before more damage could be done. These are the…
From CVE-2022-33679 to Unauthenticated Kerberoasting
February 25, 2023
On September 13, 2022, a new Kerberos vulnerability was published on the Microsoft Security Response Center's security site. It's labeled as a Windows Kerberos Elevation of Privilege vulnerability and given the CVE ID CVE-2022-33679. The MSRC page acknowledges James Forshaw of Google Project Zero for the disclosure and James published a detailed technical write-up of…
Fortinet FortiNAC CVE-2022-39952 Deep-Dive and IOCs
February 21, 2023
Introduction On Thursday, 16 February 2023, Fortinet released a PSIRT that details CVE-2022-39952, a critical vulnerability affecting its FortiNAC product. This vulnerability, discovered by Gwendal Guégniaud of Fortinet, allows an unauthenticated attacker to write arbitrary files on the system and as a result obtain remote code execution in the context of the root user. Extracting…
Chaining and Reusing Credentials
February 2, 2023
Attackers don’t need to hack in – they log in. This is why we believe Credentials are the new RCE.
VMware vRealize Log Insight VMSA-2023-0001 IOCs
January 27, 2023
Introduction The recent VMware VMSA describes four new CVEs affecting VMware vRealize Log Insight. Three of these CVEs can be combined to give an attacker remote code execution as root. This vulnerability is exploitable in the default configuration for VMware vRealize Log Insight. CVE-2022-31704: VMware vRealize Log Insight broken access control Vulnerability CVE-2022-31711: VMware vRealize…
