Skip to content
Threat Feed

April 2024 (6)

low advisory

Bitbucket Project Secret Scanning Allowlist Added

An adversary may impair defenses by adding a secret scanning allowlist rule for Bitbucket projects, potentially allowing secrets to be committed and exposed.

Bitbucket attack.defense-impairment attack.t1685
2r
medium advisory

Bitbucket Repository Exempted from Secret Scanning

An attacker may attempt to disable or bypass secret scanning on a Bitbucket repository to avoid detection of committed secrets, potentially leading to credential compromise and subsequent unauthorized access.

Bitbucket Server attack.defense-impairment attack.t1685 bitbucket
2r 1t
critical advisory

ConnectWise ScreenConnect Path Traversal Vulnerability (CVE-2024-1708)

CVE-2024-1708 is a path traversal vulnerability in ConnectWise ScreenConnect that could allow an attacker to execute remote code or directly impact confidential data and critical systems.

ScreenConnect path-traversal remote-code-execution cve-2024-1708 connectwise
2r 1t 1c
low advisory

GitHub Push Protection Bypass Detection

Detection of a GitHub user bypassing push protection, potentially leading to the exposure of secrets.

Github defense-impairment t1685
2r
critical threat

JetBrains TeamCity Relative Path Traversal Vulnerability (CVE-2024-27199)

A relative path traversal vulnerability in JetBrains TeamCity (CVE-2024-27199) could allow limited administrative actions and has been linked to ransomware attacks.

exploited TeamCity cve-2024-27199 path-traversal ransomware jetbrains
2r 1t 1c
medium advisory

Potential Abuse of AWS Console GetSigninToken

Adversaries may abuse the AWS GetSigninToken API to create temporary federated credentials for obfuscating compromised AWS access keys and pivoting to console sessions without MFA, potentially leading to lateral movement within the AWS environment.

AWS CloudTrail aws cloud lateral-movement credential-access
2r 2t

January 2024 (21)

medium advisory

Azure Firewall Rule Collection Modification or Deletion

An attacker may modify or delete Azure Firewall rule collections (Application, NAT, and Network) to impair defenses and potentially enable malicious traffic.

Azure Firewall azure firewall defense-impairment
2r 2t
high advisory

Azure Identity Protection Suspicious Browser Activity

A suspicious browser activity alert indicates anomalous behavior based on suspicious sign-in activity across multiple tenants from different countries in the same browser, potentially indicating compromised credentials or other malicious activity.

Azure identity-protection suspicious-browser
2r 6t
medium advisory

Network-Level Authentication (NLA) Disabled via Registry Modification

Adversaries may disable Network-Level Authentication (NLA) by modifying specific registry keys to bypass authentication requirements for Remote Desktop Protocol (RDP) and enable persistence mechanisms.

Microsoft Defender XDR +4 defense-evasion lateral-movement registry-modification windows
2r 2t
medium advisory

Suspicious Child Processes from Communication Applications

The detection rule identifies suspicious child processes spawned from communication applications on Windows systems, potentially indicating masquerading or exploitation of vulnerabilities within these applications.

Elastic Defend +12 defense-evasion persistence windows
3r 3t
medium advisory

Potential Enumeration via Active Directory Web Service

Adversaries may abuse the Active Directory Web Service (ADWS) to enumerate network resources and user accounts, by loading AD-related modules followed by a network connection to the ADWS dedicated TCP port.

Active Directory Web Service active-directory enumeration adws discovery windows
2r 3t
medium advisory

Expired or Revoked Driver Loaded

An expired or revoked driver being loaded on a Windows system may indicate an attempt to gain code execution in kernel mode or abuse revoked certificates for malicious purposes, potentially leading to privilege escalation or defense evasion.

Elastic Defend privilege-escalation defense-evasion windows
2r 3t
high advisory

gix-fs Symlink Prefix-Reuse Worktree Escape

A vulnerability in rust's gix-fs library (<= 0.21.0) allows a malicious actor to construct a tree that, when checked out with gitoxide, permits writing an attacker-controlled symlink into any existing directory the user has write access to, potentially leading to code execution.

gix-fs symlink worktree-escape gitoxide code-execution
3r 2t
high advisory

Grav File Cache Insecure Deserialization Vulnerability

Grav versions 1.7.44 through 1.7.49.5 are vulnerable to insecure deserialization in the File Cache component, where the `unserialize` function with `allowed_classes => true` can lead to arbitrary code execution if an attacker tampers with cache files.

grav insecure-deserialization code-execution web-application
2r 2t
high advisory

Kentico Xperience Path Traversal Vulnerability (CVE-2025-2749)

Kentico Xperience contains a path traversal vulnerability (CVE-2025-2749) that could allow an authenticated user's Staging Sync Server to upload arbitrary data to path relative locations, potentially leading to remote code execution or data compromise.

Kentico Xperience path traversal cve-2025-2749 kentico
2r 1t 1c
low advisory

Netsh Helper DLL Persistence

Attackers may abuse the Netsh Helper DLL functionality by adding malicious DLLs to execute payloads every time the netsh utility is executed via administrators or scheduled tasks, achieving persistence.

Microsoft Defender XDR +3 persistence windows netsh registry
2r 2t
critical advisory

PhpSpreadsheet SSRF and RCE Vulnerability via IOFactory::load

PhpSpreadsheet is vulnerable to Server-Side Request Forgery (SSRF) and Remote Code Execution (RCE) due to improper validation of filenames in the IOFactory::load function, exploitable via PHP wrappers like `phar://` and `ftp://`.

PhpSpreadsheet ssrf rce php deserialization
2r 2t
medium advisory

Potential Account Takeover via Mixed Logon Types

A Windows account, usually a service account, exhibiting a sudden shift in logon type patterns may indicate account compromise and lateral movement.

account-takeover privilege-escalation windows
2r 1t
high advisory

PrefectHQ Prefect Authentication Bypass Vulnerability (CVE-2026-7723)

PrefectHQ Prefect versions up to 3.6.13 are vulnerable to an authentication bypass via manipulation of the /api/events/in WebSocket endpoint, potentially allowing remote attackers to execute unauthorized actions.

prefect CVE-2026-7723 authentication-bypass websocket prefecthq
2r 1t 1c
high advisory

Saltcorn Data Tenant Admin Privilege Escalation via Tenant Creation

A vulnerability in Saltcorn Data allows tenant admins to gain unauthorized admin-level access to the root domain by creating tenants in the root domain's schema instead of their own.

Saltcorn Data privilege-escalation web-application cloud
2r 1t
medium advisory

Service Reconnaissance via WMIC.exe

Adversaries use WMIC.exe to enumerate running services on remote devices, potentially identifying valuable targets or misconfigured systems.

Windows attack.execution attack.t1047
2r 1t
low advisory

Spike in Number of RDP Connections from a Single Source IP

A machine learning job detected a high count of destination IPs establishing RDP connections with a single source IP, indicating potential lateral movement attempts after initial compromise.

lateral-movement rdp elastic
2r 2t
medium advisory

Suspicious Windows Process Cluster from Parent Process via Machine Learning

A machine learning model detected a parent process spawning a cluster of suspicious Windows processes with high malicious probability scores, potentially indicating LOLBins usage and defense evasion.

defense-evasion lolbin windows
2r 2t
medium advisory

System File Ownership Change for Defense Evasion

Adversaries may modify file or directory ownership to evade access control lists (ACLs) and access protected files, often using icacls.exe or takeown.exe to reset permissions on system files.

Microsoft Defender XDR +2 defense-evasion persistence windows
3r 1t
high advisory

TYPO3 CMS 14.2.0 Stores Passwords in Cleartext

TYPO3 CMS version 14.2.0 stores passwords in cleartext in the `uc` and `user_settings` fields of the `be_users` database table when users change their credentials in the backend user settings module.

CMS Backend typo3 cleartext-password credential-access cve-2026-6553
1r 1t
medium advisory

Windows Console History Clearing

Adversaries may clear the command history of a compromised account to conceal the actions undertaken during an intrusion on a Windows system.

M365 Defender +1 defense-evasion powershell windows
2r 2t
high advisory

Wireless Credential Dumping via Netsh

Adversaries use the Windows built-in utility Netsh to dump Wireless saved access keys in clear text, potentially leading to credential compromise.

Defender XDR +2 credential-access netsh windows
2r 2t