Finding Enterprise Credentials in Data Breaches: How to Detect Exposure

Threat actors thrive on stolen credentials, and enterprise emails are often their top prize. While much attention is given to zero-days and vulnerabilities, leaked credentials from third-party data breaches are one of the most common—and overlooked—entry points. What’s the Risk? Leaked corporate credentials are frequently used in password spraying, credential stuffing, and phishing attacks. If […]

Cybersecurity 4.0: The Need for Continuous Learning in the Age of AI

Organizations are continuing to grapple with a cybersecurity talent shortage during a time of rapid growth of AI-driven threats. The rise in AI usage applies not only to security teams but also to the cyber threat actors they are working to defend against. More and more, attackers are leveraging generative AI to launch sophisticated intrusions. […]

Exploiting Kaseya Unitrends Backup Appliance – Part 1

Multiple vulnerabilities were discovered in the Unitrends Backup appliance and client software. An attacker with network access to the management interface or backup ports on the client or server could be exploited to compromise the machine. Both suffer from critical remote code execution vulnerabilities.

How To Reverse Engineer the SolarWinds Hack

When it comes to security incidents involving malware, most of us rely on the information provided by the investigating firm to understand what the malware does, why it does it, and how to find it in our own environment. However, if you are interested in more in-depth details like us, you also want to know […]

Multiple Vulnerabilities Discovered in Aviatrix

Versions Tested: Aviatrix Cloud Controller UserConnect-5.3.1516 Aviatrix VPN Client 2.8.2 Product: https://aviatrix.com/cloud-network-platform/ Security Advisories: https://docs.aviatrix.com/HowTos/security_bulletin_article.html Summary: CyberOne discovered multiple vulnerabilities in the Aviatrix Cloud Controller appliance v5.3.1516 and Aviatrix VPN client v2.8.2 for Linux, macOS, and Windows and would like to thank the Aviatrix security team for partnering with us to get the issues resolved. The Aviatrix security […]

Local Privilege Escalation Vulnerability Discovered in VMware Fusion

Summary: VMware Fusion contains a local privilege escalation vulnerability that allows an attacker to inject a malicious path into the system-wide PATH environment variable. Versions Tested: VMware Fusion Professional v15.5.5 Product: https://www.vmware.com/products/fusion.html Security Advisories: https://www.vmware.com/security/advisories/VMSA-2020-0020.html CVE Number: CVE-2020-3980 CVSS Score: 6.7 CWE: CWE-269: Improper Privilege Management Vulnerability Details During a startup, VMware Fusion updates the […]

F5 BIG-IP Remote Code Execution Exploit – CVE-2020-5902

When CyberOne began research into the vulnerability identified in the F5 TMUI RCE vulnerability advisory, we initially started by reading the advisory and mitigation steps, which contained minimal details but included key pieces of information needed to kick off our research. The advisory states that the vulnerability impacts a variety of capabilities when exploited, including the ability […]

Uncovering Your Security Blind Spots: Keys to Protecting your Organization from the Unknown

Many organizations are shocked to learn their systems have been breached, with attackers having exposed vulnerabilities. However, you can defend your organization against these threats by taking some proactive measures. Minimizing your security risk begins with risk management – ensuring proper asset management, implementing policies and procedures around protecting assets, and effective risk mitigation. Yet […]