Vendor
high
advisory
Multi-Stage 'Code of Conduct' Phishing Campaign Leads to AiTM Token Compromise
2 rules 2 TTPs 2 IOCsA widespread phishing campaign utilized 'code of conduct' lures, a multi-step attack chain, and legitimate email services to distribute authenticated messages from attacker-controlled domains, ultimately leading to adversary-in-the-middle (AiTM) token compromise, primarily targeting US-based organizations.
Microsoft Defender for Office 365
phishing
credential-theft
AiTM
token-compromise
2r
2t
2i
high
advisory
livewire-markdown-editor Arbitrary File Upload Vulnerability
2 rules 1 TTPThe livewire-markdown-editor versions before v1.3 contain an arbitrary file upload vulnerability in the MarkdownEditor::updatedAttachments() Livewire handler, allowing authenticated users to upload any file type, potentially leading to stored XSS, phishing, malware distribution, and markdown injection.
mckenziearts/livewire-markdown-editor +3
arbitrary-file-upload
stored-xss
vulnerability
2r
1t