Chinese

Japanese Orgs Hacked ‘by China’ in Long, Widespread Campaign

Chinese state-backed threat actors APT10 have been hacking Japanese businesses for at least a year ...
Security Boulevard
Zerologon

Beware of Zerologon Vulnerabilities in Windows Server

Researchers have new discovered a new Common Vulnerability & Exposure (CVE) called Zerologon. According to, Microsoft’s Security Update Aug. 11: “The elevation of privilege vulnerability for Zerologon, or CVE-2020-147, exists when an ...
Security Boulevard

Microsoft Domain Controller “ZeroLogon” and RCE Vulnerabilities Test

The post Microsoft Domain Controller “ZeroLogon” and RCE Vulnerabilities Test appeared first on Digital Defense, Inc ...

Zerologon: Tripwire Industrial Visibility Threat Definition Update Released

Today, we released a Threat Definition Update bundle for our Tripwire Industrial Visibility solution to aid in the detection of Zerologon. Otherwise known as CVE-2020-1472, Zerologon made news in the summer of ...
Cyber Security Roundup for October 2020

Cyber Security Roundup for October 2020

A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, September 2020.COVID-19 wasn't the only virus seriously disrupting the start ...
Microsoft: Attackers Exploiting ‘ZeroLogon’ Windows Flaw

Microsoft: Attackers Exploiting ‘ZeroLogon’ Windows Flaw

Microsoft warned on Wednesday that malicious hackers are exploiting a particularly dangerous flaw in Windows Server systems that could be used to give attackers the keys to the kingdom inside a vulnerable ...
zerologon

Feds Yell PATCH NOW over Windows AD ‘Zerologon’ Vuln

CISA sent an unusual warning late last week. The source of their fears? The Zerologon vulnerability, disclosed last week ...
Security Boulevard

Detecting Zerologon (CVE-2020-1472) with Zeek

By Yacin Nadji, Corelight Security Researcher CVE-2020-1472 aka Zerologon, disclosed by Tom Tervoort of Secura, is an illustrative case study of how a small implementation mistake in cryptographic routines cascades into a ...