exploitation

  1. Windows 11 Kernel Transaction Manager (KTM) Cookies: Hidden Threats and Privilege Escalation Risks

    Cookie-based attacks and overlooked tokens have quietly lingered on the periphery of infosec conference talks for years, but recent research presented at OffensiveCon25 has shone a spotlight on the very heart of Windows 11's Kernel Transaction Manager (KTM). This kernel subsystem—once considered...
  2. Uncovering Windows 11 KTM Vulnerabilities: Cookies and Exploits at OffensiveCon 2025

    At OffensiveCon 2025, held at the Hilton Berlin, security researchers presented a groundbreaking analysis titled "Hunting For Overlooked Cookies In Windows 11 KTM And Baking Exploits For Them." This presentation delved into the intricacies of the Windows 11 Kernel Transaction Manager (KTM)...
  3. Microsoft May 2025 Patch Tuesday Review: Critical Vulnerabilities & Essential Security Strategies

    Microsoft’s May Patch Tuesday has arrived with a sense of urgency and breadth seldom matched in recent years. While each Patch Tuesday serves as a recurring reminder of Windows’ ubiquity and its complex, ever-evolving threat landscape, the May 2025 edition stands out due to both its sheer...
  4. CISA's KEV Catalog: Prioritized Cybersecurity Threats and How Organizations Can Respond

    As the threat landscape continues to evolve, so too do the strategies and mandates aimed at minimizing risk within both federal systems and the broader digital ecosystem. The recent news from the Cybersecurity and Infrastructure Security Agency (CISA), announcing the addition of a new...
  5. CISA Adds Critical Linux Kernel Vulnerabilities to KEV Catalog – What You Need to Know

    The Cybersecurity and Infrastructure Security Agency (CISA) has recently expanded its Known Exploited Vulnerabilities (KEV) Catalog by adding two critical vulnerabilities identified in the Linux Kernel: CVE-2024-53197: An out-of-bounds access vulnerability. CVE-2024-53150: An out-of-bounds read...
  6. CISA Adds New Critical Vulnerabilities to KEV Catalog: Urgent Patching Guide for Organizations

    The latest update from the Cybersecurity and Infrastructure Security Agency (CISA) signals an ongoing and highly dynamic threat landscape for organizations relying on open-source and proprietary products alike. On May 1, 2025, CISA added two newly observed vulnerabilities—CVE-2024-38475, an...
  7. CISA Adds Critical CVE-2025-31324 SAP Vulnerability to Exploited Catalog, Urges Immediate Action

    In another development underscoring the persistent and ever-evolving nature of cyber threats, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has announced the addition of a new entry to its Known Exploited Vulnerabilities Catalog. This action, recorded on April 29, 2025...
  8. Critical Windows NTLM Vulnerability Exploited in Rapidly Spreading Cyberattacks

    Microsoft's Patch Tuesday on March 11, 2025, introduced crucial security updates, among them a vulnerability labeled CVE-2025-24054 impacting the NTLM authentication protocol. Though Microsoft initially rated this vulnerability as "less likely" to be exploited, reality quickly contradicted that...
  9. Urgent CISA Alerts: Critical Exploited Vulnerabilities You Must Address Now

    A new alert from the Cybersecurity and Infrastructure Security Agency (CISA) has intensified the urgency around two critical vulnerabilities now known to be under active exploitation. These additions to the agency’s Known Exploited Vulnerabilities Catalog are more than simple database entries...
  10. Mitigate Fortinet Vulnerabilities: Key Steps to Protect Your Devices from Exploitation

    Here is a summary and important mitigation information based on your shared CISA advisory about the new Fortinet vulnerabilities (CVE-2024-21762, CVE-2023-27997, and CVE-2022-42475): Summary: Threat: A threat actor is creating a malicious file using previously exploited Fortinet...
  11. CISA Adds 3 Critical Vulnerabilities to Exploited List, Urges Immediate Remediation

    Here is a summary based on the article from CISA (Cybersecurity and Infrastructure Security Agency): On March 19, 2025, CISA added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, following evidence of active exploitation. These vulnerabilities frequently serve as attack...
  12. Cybersecurity Alert: CISA Updates KEV Catalog with Critical Vulnerabilities

    The ongoing battle to secure digital infrastructure just gained renewed attention as the Cybersecurity and Infrastructure Security Agency (CISA) announced an important update to its Known Exploited Vulnerabilities (KEV) Catalog. In its latest bulletin, CISA added two significant...
  13. CISA Adds 6 New Exploited Vulnerabilities to KEV Catalog—Act Now to Secure Your Systems

    The Cybersecurity and Infrastructure Security Agency (CISA) has once again underscored the dynamic and ever-pressing nature of cybersecurity threats by adding six new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog. These additions, prompted by concrete evidence of active...
  14. Urgent Cybersecurity Alert: Critical Cisco Router and Windows Kernel Vulnerabilities Active Now

    A wave of freshly discovered vulnerabilities is currently sending ripples of concern throughout enterprise IT landscapes, with both Cisco routers and mainstream Windows systems falling squarely in the crosshairs. These aren't abstract security risks for the future—they are being actively...
  15. Microsoft Patch Tuesday – February 11, 2025 – 55 Vulnerabilities Fixed, 4 Zero-Days Exploited in the Wild

    Microsoft has released its February 2025 Patch Tuesday security updates, addressing a total of 55 vulnerabilities across various Windows products. Among these, 3 are classified as critical, and 4 are zero-day vulnerabilities, with 2 actively exploited in the wild. Critical Vulnerabilities...
  16. AA21-336A: APT Actors Exploiting CVE-2021-44077 in Zoho ManageEngine ServiceDesk Plus

    Original release date: December 2, 2021 Summary This joint Cybersecurity Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9. See the ATT&CK for Enterprise framework for referenced threat actor techniques and for mitigations. This joint...
  17. AA21-321A: Iranian Government-Sponsored APT Cyber Actors Exploiting Microsoft Exchange and Fortinet Vulnerabilities in Furtherance of Malicious Activi

    Original release date: November 17, 2021 Summary Actions to Take Today to Protect Against Iranian State-Sponsored Malicious Cyber Activity • Immediately patch software affected by the following vulnerabilities: CVE-2021-34473, 2018-13379, 2020-12812, and 2019-5591. • Implement Link Removed. •...
  18. VIDEO AA21-287A: Ongoing Cyber Threats to U.S. Water and Wastewater Systems

    Original release date: October 14, 2021 Summary Immediate Actions WWS Facilities Can Take Now to Protect Against Malicious Cyber Activity • Do not click on Link Removed. • If you use RDP, secure and monitor it. • Use Link Removed. • Use Link Removed. Note: This advisory uses the MITRE...
  19. AA21-209A: Top Routinely Exploited Vulnerabilities

    Original release date: July 28, 2021 Summary This Joint Cybersecurity Advisory was coauthored by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the Australian Cyber Security Centre (ACSC), the United Kingdom’s National Cyber Security Centre (NCSC), and the U.S. Federal Bureau...
  20. AA21-200B: Chinese State-Sponsored Cyber Operations: Observed TTPs

    Original release date: July 19, 2021 Summary This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9, and MITRE D3FEND™ framework, version 0.9.2-BETA-3. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques...