Resources

Learn about CYREBRO’s platform, technology, and capabilities, read about industry insights, watch webinars with cyber experts, and much more in the resources below.

  • 5 Common Attacker Entry Points
    Guides & E-books

    5 Common Attacker Entry Points

    Cyberattacks against SMBs are increasing at an alarming pace, but your company doesn't have to become the next victim.

  • KeePass Vulnerability Allows Obtaining Cleartext Passwords
    Threat Intelligence

    KeePass Vulnerability Allows Obtaining Cleartext Passwords

    May 22, 2023 KeePass Vulnerability Allows Obtaining Cleartext Passwords A recently discovered vulnerability in the open-source password management tool KeePass might allow the master password to be retrieved. The vulnerability has a proof-of-concept (PoC) exploit available. The Vulnerability CVE-2023-32784 –  Vulnerability in “SecureTextBoxEx” in KeePass –  where the master password and other passwords are entered…

  • Trend Micro Patches Critical RCE Vulnerability in Apex One
    Threat Intelligence

    Trend Micro Patches Critical RCE Vulnerability in Apex One

    May 22, 2023 Trend Micro Patches Critical RCE Vulnerability in Apex One Trend Micro has issued a new Critical Patch (CP) for Trend Micro Apex One and Trend Micro Apex One as a Service, which addresses a number of previously identified vulnerabilities. The Critical RCE Vulnerability CVE-2023-32557, (CVSS 3.1: 9.8, Critical) – Management Server Path…

  • Apple Patches Three Zero-Day Vulnerabilities
    Threat Intelligence

    Apple Patches Three Zero-Day Vulnerabilities

    May 21, 2023 Apple Patches Three Zero-Day Vulnerabilities Apple has addressed three zero-days vulnerabilities in macOS and additional products. The Zero-day Vulnerabilities CVE-2023-28204 – Sandbox Escape Vulnerability. A remote threat actor can exploit this vulnerability to break out of web content sandboxes. CVE-2023-32409, CVE-2023-32373 – Out-Of-Bounds Read Vulnerabilities. A threat actor can exploit these vulnerabilities…

  • CISCO Patches Critical Vulnerabilities
    Threat Intelligence

    CISCO Patches Critical Vulnerabilities

    May 18, 2023 CISCO Patches Critical Vulnerabilities Cisco has addressed four critical RCE (Remote Code Execution) vulnerabilities discovered in multiple Small Business Series Switches. Successful exploit of any of the vulnerabilities could allow a threat actor to execute arbitrary code with root privileges on compromised devices. The vulnerabilities are triggered by incorrect validation of requests…

  • Google Patches RCE Vulnerabilities in Chrome
    Threat Intelligence

    Google Patches RCE Vulnerabilities in Chrome

    May 17, 2023 Google Patches RCE Vulnerabilities in Chrome Google has released Chrome version 113.0.5672.126/127 (Stable Channel), patching 12 vulnerabilities. Successful exploitation of some of these vulnerabilities could allow remote code execution (RCE) on the targeted system. The RCE Vulnerabilities CVE-2023-2721, Critical – Use after free vulnerability in Navigation which allows a remote attacker to…

  • Cybersecurity and Data Protection Laws 101
    Guides & E-books

    Cybersecurity and Data Protection Laws 101

    Aside from the obvious need to protect your business, customers, and reputation, there is another reason for businesses of all sizes to use cybersecurity to guard users’ personal information: staying compliant with the law.

  • SOC-as-a-Service vs. cloud-based SOC platform comparison
    Guides & E-books

    SOC-as-a-Service vs. cloud-based SOC platform comparison

    Establishing and running an in-house SOC may not always be feasible, as there are many options to choose from. Many organizations opt for outsourcing the SOC to a third-party provider of managed security services.

  • Threat Hunting Tools
    Guide

    Threat Hunting Tools

    Cyber threat hunting is a proactive and iterative search through endpoints, networks, and datasets to detect suspicious, malicious, and risky activities that have evaded detection by existing cybersecurity controls.

  • SOC Threat Intelligence
    Guide

    SOC Threat Intelligence

    Cyber threat hunting is a proactive and iterative search through endpoints, networks, and datasets to detect suspicious, malicious, and risky activities that have evaded detection by existing cybersecurity controls.

  • The SMB’s Guide to Large Enterprise-Like Cybersecurity
    Guides & E-books

    The SMB’s Guide to Large Enterprise-Like Cybersecurity

    The cyberattacks that are launched on large enterprises are the ones that tend to grab the big headlines because of the big numbers involved with their colossal impact.

  • What’s the Best Cyber Security Approach for Your Small-to-Medium Business?
    Guides & E-books

    What’s the Best Cyber Security Approach for Your Small-to-Medium Business?

    Nearly 70% of small-to-medium businesses (SMBs) are not worried about getting hacked, mostly because they don’t think they have the resources that hackers typically seek out, whether it’s funds or valuable sensitive information.

  • Critical WordPress “Elementor” Addons Plugin Site-Takeover Vulnerability
    Threat Intelligence

    Critical WordPress “Elementor” Addons Plugin Site-Takeover Vulnerability

    May 14, 2023 Critical WordPress “Elementor” Addons Plugin Site-Takeover Vulnerability ‘Essential Addons for Elementor’ has released patch for a critical vulnerability. Successful exploitation can allow an unauthenticated attacker to impersonate an administrator and completely take over a website without requiring any user interaction or social engineering. The Vulnerability CVE-2023-32243 (CVSS 3.1: 9.8, Critical) – Improper Authentication vulnerability…

  • Ruckus RCE vulnerability exploits in the wild
    Threat Intelligence

    Ruckus RCE vulnerability exploits in the wild

    May 10, 2023 Ruckus RCE vulnerability exploits in the wild Following the critical vulnerability in Ruckus Wireless Admin panels that was fixed on February 8, 2023. Exploitation of the vulnerability by a botnet named ‘AndoryuBot’ and remote code execution was observed. The Critical Vulnerability CVE-2023-25717 (CVSS 3.1: 9.1, Critical) Vulnerability in Ruckus Wireless Admin panels…

  • SAP Patches Critical Vulnerabilitiy Affects SAP BusinessObjects Intelligence Platform 
    Threat Intelligence

    SAP Patches Critical Vulnerabilitiy Affects SAP BusinessObjects Intelligence Platform 

    May 10, 2023 SAP Patches Critical Vulnerabilitiy Affects SAP BusinessObjects Intelligence Platform As part of May monthly security rollup updates, SAP has released patches to resolve several vulnerabilities which affect several SAP products including critical vulnerability affects SAP BusinessObjects Intelligence Platform. The Critical Vulnerability CVE-2023-28762 (CVSS 3.1: 9.1, Critical) -An Information Disclosure vulnerabilities in SAP…

  • Cisco phone adapters vulnerable to RCE attacks
    Threat Intelligence

    Cisco phone adapters vulnerable to RCE attacks

    May 10, 2023 Cisco phone adapters vulnerable to RCE attacks Cisco has identified a vulnerability in the web-based management interface of Cisco SPA112 2-Port Phone Adapters that allows an unauthenticated, remote attacker to execute arbitrary code on the devices. Since Cisco SPA112 2-Port Phone Adapters are unlikely to be connected to the Internet, these issues…

  • Mozilla Patches RCE Vulnerabilities in Firefox & Firefox ESR
    Threat Intelligence

    Mozilla Patches RCE Vulnerabilities in Firefox & Firefox ESR

    May 10, 2023 Mozilla Patches RCE Vulnerabilities in Firefox & Firefox ESR Mozilla has released security updates to address vulnerabilities in Firefox. An attacker could exploit these vulnerabilities to take control of an affected system. The RCE Vulnerabilities CVE-2023-32215 High severity – Memory corruption vulnerability, successful exploitation of which may allow a malicious actor to remotely run…

  • Microsoft Patches Actively-Exploited 3 Zero-Days & 12 RCE Vulnerabilities
    Threat Intelligence

    Microsoft Patches Actively-Exploited 3 Zero-Days & 12 RCE Vulnerabilities

    May 10, 2023 Microsoft Patches Actively-Exploited 3 Zero-Days & 12 RCE Vulnerabilities As part of May monthly security rollup updates, Microsoft has patched 3 Zero-Day and 12 Remote Code Execution (RCE) vulnerabilities. Overall, Microsoft has patched 40 vulnerabilities across Windows, VS, Edge, Office, RDP and others. The Zero-Day Vulnerabilities CVE-2023-29336, (CVSS 3.1: 7.8, High-Severity) –…