PacketWatch_Logo_Inline_Reverse

 

Threat Intelligence Research

Read our latest threat intelligence, produced by our team of battle-hardened analysts and research team.

MOVEit File Transfer Zero-Day Critical Vulnerability

2 min read

I (don't) like to MOVEit MOVEit

PacketWatch was made aware this morning of a critical vulnerability being actively exploited with a file transfer software MOVEit, from the company Progress. In Progress’ article addressing these security concerns, there is currently a patch...

Read More
Acropalypse Image Cropping Vulnerability Google Microsoft

2 min read

Acropalypse Now: New Bug and Zero-Day Discovered in Multiple Image Editing Products

Bottom Line Up Front (BLUF) Cropped screenshots on affected software leave behind image data that can be recovered, potentially revealing uncropped...

Read More
microsoft-outlook-vulnerability cve-2023-23397

1 min read

Critical Vulnerability in Outlook Requiring Little to No Interaction Patched by Microsoft

Read our latest Enterprise Threat Intelligence Briefing on the Microsoft Outlook Elevation of Privilege Vulnerability, compiled by Kyle Nordby and ...

Read More
cisa-vmware-nsx-v-manager-cve

1 min read

CISA Adds Additional VMware Security Flaw to Known Exploited Vulnerabilities Catalog

CVE-2021-39144 – VMware Cloud Foundation XStream Remote Code Execution Vulnerability The Cybersecurity and Infrastructure Security Agency (CISA) has...

Read More
Robbinhood Ransomware Gang Still Operational

2 min read

Robbinhood Ransomware Gang Still Operational

Robbinhood History One of the most notorious ransomware gangs from 2019 and 2020 is known as Robbinhood (with 2 B’s). They made a name for...

Read More
Conti Ransomware Group

2 min read

Lessons Learned from #ContiLeaks

ContiLeaks Background

Read More
Surge in Bitcoin Mining Attacks Expected

1 min read

Surge in Bitcoin Mining Attacks Expected

History Repeats Itself During the surge of Bitcoin prices in 2017, nefarious actors hacked everything from web servers to browsers in an attempt...

Read More
lockbit-ransomware-living-off-the-land

1 min read

Living Off the Land (LOTL): A Case Study

Overview During a recent incident involving LockBit ransomware, we discovered a persistent credential harvester that was hidden as a scheduled...

Read More