In-house Microsoft Exchange zero-day attack mitigation is not enough

It appears the mitigation that Microsoft has published for the vulnerabilities CVE-2022-41040 and CVE-2022-41082 is not enough: Microsoft Exchange server zero-day mitigation can be bypassed (bleepingcomputer.com) These vulnerabilities are being actively exploited and now the steps put in place to defend against the issue can be bypassed and others are …

Do you operate an Exchange Server? Is it patched and up to date?

There is an actively exploited zero-day flaw being reported, that Microsoft has not yet patched – so have a look at GTSC’s blog post: Warning: New attack campaign utilized a new 0-day RCE vulnerability on Microsoft Exchange Server | GTSC (gteltsc.vn) The post also includes some temporary mitigation whilst waiting …

Then there was a third problem with WordPress… BackupBuddy

wordpress icon

WordPress plugin called BackupBuddy I wrote an article today for our training site CyberAwake, questioning exactly how much governance organisations are extending to their websites. The article started off because of two WordPress issues this week and during my background reading for the article I came across this from last …

Two WordPress vulnerability posts in a day – WPGateway zero-day vulnerability

WordPress website claim makes it a BYOD risk

Earlier today I wrote about the FishPig/Magento supply chain attack, now I have come across another WordPress cyber security problem. A popular WordPress plugin is being actively exploited. PSA: Zero-Day Vulnerability in WPGateway Actively Exploited in the Wild (wordfence.com) The Wordfence Threat Intelligence team have warned that WordPress sites running …