Remove tag germany
article thumbnail

Shadowserver reported that +15K Citrix servers are likely vulnerable to attacks exploiting the flaw CVE-2023-3519

Security Affairs

Most of the servers are located in the United States and Germany. Update on CVE-2023-3519 vulnerable IPs: we now tag 15K Citrix IPs as vulnerable to CVE-2023-3519. We extended the tagging logic to tag as vulnerable all that return Last Modified headers with a date before July 1, 2023 00:00:00Z.

article thumbnail

Security Affairs newsletter Round 371 by Pierluigi Paganini

Security Affairs

SecurityAffairs awarded as Best European Personal Cybersecurity Blog 2022 Crooks are using RIG Exploit Kit to push Dridex instead of Raccoon stealer Flagstar Bank discloses a data breach that impacted 1.5

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fortinet FortiNAC CVE-2022-39952 flaw exploited in the wild hours after the release of PoC exploit

Security Affairs

Tags and blocklists available now. Hat tip to @Horizon3Attack [link] pic.twitter.com/tHyYHIXQKA — Andrew Morris (@Andrew Morris) February 22, 2023 At the time of this writing, the attacks observed by GreyNoise originated from two IP addressed, respectively in Germany and the US. 1/ Heads Up!

article thumbnail

Malicious dropper apps on Play Store totaled 30.000+ installations

Security Affairs

Germany, Spain, Poland, Austria, the U.S., “Android offers a way to tag the content of the window as secure, by using the “FLAG_SECURE” , which prevents it “from appearing in screenshots or from being viewed on non-secure displays”. Australia, France, and the Netherlands. ” continues the report.

article thumbnail

PoC exploits for Atlassian CVE-2022-26134 RCE flaw released online

Security Affairs

Tags available to all @GreyNoiseIO users now – Create an account to deploy a dynamic block list to block it [link] pic.twitter.com/xXldngWdPH — Andrew Morris @ RSA (@Andrew Morris) June 4, 2022. China, and Germany. “It 23 unique IPs so far. Most of the installs are located in the U.S.,

article thumbnail

Exclusive: Pro-Russia group ‘Cyber Spetsnaz’ is attacking government agencies

Security Affairs

Other divisions involved in the DDoS attacks included “Vera”, “FasoninnGung”, “Mirai”, “Jacky”, “DDOS Gung” and “Sakurajima” who previously attacked multiple WEB-resources in Germany. .

article thumbnail

Balada Injector still at large – new domains discovered

Security Affairs

Within the file, there were seven brackets of PHP tags and each of them contained an obfuscated piece of code within. The PHP tags were stacked on top of each other, having legitimate code of the website at the very bottom. Therefore, if the syntax was correct, it ran the malicious code before serving the actual website being visited.

Access 89