Author Archives: CSIRT

Windows MSHTML 0-Day Exploited to Deploy Cobalt Strike Beacon in Targeted Attacks

Microsoft on Wednesday disclosed details of a targeted phishing campaign that leveraged a now-patched zero-day flaw in its MSHTML platform using specially-crafted Office documents to deploy Cobalt Strike Beacon on compromised Windows systems. “These attacks used the vulnerability, tracked as CVE-2021-40444 (, as part of an initial access campaign that distributed custom Cobalt Strike Beacon loaders,” […]

Patch Chrome! Update fixes 11 security vulnerabilities

By Charlie Fripp Google’s Chrome is one of the most popular browsers globally, used by billions of people. So, when issues in the code are discovered, Google needs to act quickly. Not only to protect users but also the company’s security reputation. A case in point? Several vulnerabilities have been recorded in the latest version […]

Adobe Snuffs Critical Bugs in Acrobat, Experience Manager

Adobe releases security updates for 59 bugs affecting its core products, including Adobe Acrobat Reader, XMP Toolkit SDK and Photoshop. Adobe is urging its throngs of Acrobat Reader users to update their software to fix critical vulnerabilities that could allow adversaries to execute arbitrary code on unpatched versions. The warnings are part of the firm’s September […]

Azure Zero-Day Flaws Highlight Lurking Supply-Chain Risk

Author: Elizabeth Montalbano Dubbed OMIGOD, a series of vulnerabilities in the Open Management Infrastructure used in Azure on Linux demonstrate hidden security threats, researchers said. Four Microsoft zero-day vulnerabilities in the Azure cloud platform’s Open Management Infrastructure (OMI) — a software that many don’t know is embedded in a host of services — show that […]

Zero-click RCE vulnerability in Hikvision security cameras could lead to network compromise

Abuse of flaw could give attackers greater access to devices even than its owner A zero-click ( in a popular IoT security camera could allow an unauthenticated attacker to gain full access to the device and possibly internal networks, a researcher has warned. The researcher, dubbed ‘Watchful IP’, has released details of the unauthenticated remote […]