security

๐Ÿ“… Kalender

< March 2026 >
Mo
Di
Mi
Do
Fr
Sa
So
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
1718192021222324
25
26
27
28
29
30
31
Gefiltert nach: 19. Mรคrz 2026 โœ•
soc

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. 

  • CVE-2026-20131 Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management Deserialization of Untrusted Data Vulnerability

This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise. 

Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria

Mehr lesen โ†’
soc

Ransomware 3.0: The Autonomous Threat That Changed Everything

Ransomware 3.0: The Autonomous Threat That Changed Everything Ransomware has changed a lot over time and gone through major shifts, it’s now โ€œRansomware 3.0.โ€ The changes across the years explain why the threats in 2026 look very different from what security teams faced ten years ago. Ransomware 1.0 (1989โ€“2018): Encrypt and Demand The first era […]

Mehr lesen โ†’
security

Interesting Message Stored in Cowrie Logs, (Wed, Mar 18th)

This activity was found and reported by BACS student Adam Thorman&#xc2;&#xa0;as part of one of his assignments which I posted his final paper &#x5b;1&#x5d; last week. This activity appeared to only have occurred on the 19 Feb 2026 where at least 2 sensors detected on the same day by DShield sensor in the cowrie logs an echo command that included: „MAGIC&#x5f;PAYLOAD&#x5f;KILLER&#x5f;HERE&#x5f;OR&#x5f;LEAVE&#x5f;EMPTY&#x5f;iranbot&#x5f;was&#x5f;here“. My DShield sensor captured activity from source IP 64.89.161.198 between 30 Jan – 22 Feb 2026 that included portscans, a successful login via Telnet (TCP/23) and web access that included all the activity listed below captured by the DShield sensor (cowrie, webhoneypot & iptables logs).

Mehr lesen โ†’