Latest Crowdstrike Update Issue: The issue seems widespread, affecting machines running various Crowdstrike sensor versions. Crowdstrike has acknowledged the problem and is currently investigating the cause. Many Windows users are experiencing Blue Screen of Death errors following a recent Crowdstrike update, according to reports and a pinned message on the company’s forum. The issue seems […]
Author Archives: CSIRT
Summary A backdoor has been identified in versions 5.6.0 and 5.6.1 of XZ Utils (assigned CVE-2024-3094), which under some conditions may allow RCE via SSH authentication in specific versions of certain Linux distributions. Affected products There are many distributions that are potentially impacted by CVE-2024-3094. The following vendors have publicly addressed the vulnerability: Distro Notes […]
A critical vulnerability (CVE-2021-44228) has recently been discovered that affects Log4j versions from 2.0-beta9 to 2.14.1, and is critical as it can be remotely exploited by a non-authenticated attacker allowing remote code execution (RCE). The vulnerability is rated 10 out of 10 in the Common Vulnerability Rating System (CVSS), which describes how serious the vulnerability […]
The Apache Software Foundation has released fixes to contain an <<https://twitter.com/DTCERT/status/1469258597930614787>> <<https://www.cert.govt.nz/it-specialists/advisories/log4j-rce-0-day-actively-exploited/>> zero-day vulnerability affecting the widely-used Apache Log4j Java-based logging library that could be weaponized to execute malicious code and allow a complete takeover of vulnerable systems. Tracked as <<https://nvd.nist.gov/vuln/detail/CVE-2021-44228>> and by the monikers Log4Shell or LogJam, the issue concerns a case of unauthenticated, […]
Ransomware is the most prominent threat in the cyber space today. Cyber insurer (https://www.insurancebusinessmag.com/us/companies/allianz/66992/) Global Corporate & Specialty (AGCS) recently went so far as to call ransomware a “pandemic” – one that is spreading rapidly around the world. This variation of malware allows hackers to lock businesses or individuals out of their systems and encrypt […]