Cyber Newsroom Feed
The "Cyber Newsroom Feed" module is a live feed of the latest cyber news enriched with CVE and vulnerability data. The feed is updated every 5 minutes and includes the latest news from the cyber security industry. The feed is designed to provide users with a comprehensive overview of the latest cyber security news and trends.

-
huntress.com
VMware Horizon Servers Actively Being Hit With Cobalt Strike | Huntress
On January 5, the UK’s National Health Service (NHS) alerted that hackers were actively targeting Log4Shell vulnerabilities in VMware Horizon servers in an effort to establish persistent access via we ... Read more

-
objective-see.org
Where's the Interpreter!?
Where's the Interpreter!? (CVE-2021-30853) bypassing file quarantine, gatekeeper, & notarization requirements ...again! by: Patrick Wardle / December 22, 2021 Objective-See's research, tools, and writ ... Read more

-
curatedintel.org
Nightmare Before Christmas - Curated Intel's Response To Log4Shell
Written by @BushidoToken, @TrevorGiffen | Edited by @SteveD3On late Thursday, 9 December, security researchers warned of a critical vulnerability with wide ramifications. With a CVSS score of 10.0 (Cr ... Read more

-
huntress.com
Critical RCE Vulnerability: log4j - CVE-2021-44228 | Huntress
Our team is investigating CVE-2021-44228, a critical vulnerability that’s affecting a Java logging package log4j which is used in a significant amount of software, including Apache, Apple iCloud, Stea ... Read more

-
huntress.com
Critical RCE Vulnerability Updates (log4j - CVE-2021-44228) | Huntress
Our team is investigating CVE-2021-44228, a critical vulnerability that’s affecting a Java logging package log4j which is used in a significant amount of software, including Apache, Apple iCloud, Stea ... Read more

-
huntress.com
Hackers Are Exploiting a Vulnerability in Billing Software to Deploy Ransomware | Huntress
Hackers are constantly looking for low-hanging fruit and vulnerabilities that can be exploited - and they’re not always poking around in “big” mainstream applications like Office.Sometimes, a producti ... Read more

-
huntress.com
The Top Four CVEs Attackers Exploit | Huntress
While the move to remote work last year gave many of us comforts such as working in our pajamas and being 10 steps away from the fridge, it’s been a bit of a nightmare for those who work in cybersecur ... Read more

-
objective-see.org
Analysis of CVE-2021-30860
Analysis of CVE-2021-30860 the flaw and fix of a zero-click vulnerability, exploited in the wild by: Tom McGuire / September 16, 2021 Objective-See's research, tools, and writing, are supported by the ... Read more

-
huntress.com
Threat Advisory: Hackers Are Exploiting CVE-2021-40444 | Huntress
On September 7, Huntress was made aware of a new threat against Windows operating systems and Microsoft Office products. With the identifier CVE-2021-40444, the MSHTML engine is vulnerable to arbitrar ... Read more

-
huntress.com
Microsoft Exchange Servers Still Vulnerable to ProxyShell Exploit | Huntress
Attackers are actively scanning for vulnerable Microsoft Exchange servers and abusing the latest line of Microsoft Exchange vulnerabilities that were patched earlier this year. Back in March, we saw m ... Read more