-
[2022 Issue 16] Zyxel Threat Intelligence (Release Date: 2022-11)
ZyWALLs
latest virus/malware signature update protect you against more malware and
threats. See how ZyWALL
defends against these threats. Part 1 – Virus/Malware Spotlight Part 2 – Intrusion Detection Highlight Part 3 – Application Patrol Highlight This article focuses on Trojan.BitCoinMiner.
Part 2 and 3 will be included…
-
Zyxel Threat Intelligence (Release Date: 2022-05-01)
ZyWALLs latest virus/malware signature update protects you against more malware and threats. See how ZyWALL defends against these threats. Part 1 – Virus/Malware Spotlight Part 2 – Intrusion Detection Highlight Part 3 – Application Patrol Highlight This article focuses on
Win32.Worm.Brontok. Part 2 and 3 will be included…
-
Zyxel Threat Intelligence (Release Date: 2022-04-01)
ZyWALLs
latest virus/malware signature update protects you against more malware and
threats. See how ZyWALL
defends against these threats. Part 1 – Virus/Malware Spotlight Part 2 – Intrusion Detection Highlight Part 3 – Application Patrol Highlight This article focuses on Potential Unwanted Application (PUA). Part 2 and 3…
-
Zyxel Threat Intelligence (Release Date: 2022-03-01)
ZyWALLs latest virus/malware signature update protects you against more malware and threats. See how ZyWALL defends against these threats. Part 1 – Virus/Malware Spotlight Part 2 – Intrusion Detection Highlight Part 3 – Application Patrol Highlight This article focuses on TeslaCrypt. Part 2 and 3 will be included in the…
-
Guard against Log4Shell
What is Vulnerable Log4j Package? Log4j is an open-source project that is widely used for logging
in JAVA. Log4j was found a remote code injection in the version between 2.x.x
and 2.14.x. (However, a new exploit for log4j, CVE-2021-45046, was also found
in 2.15. We recommend to update to the version 2.17). That allows…
-
Zyxel Threat Intelligence (Release Date: 2021-12-14)
This article focuses on rogueware. Part 2 and 3 will be included in the December Monthly Threat Report covering Intrusion Detection and Application Patrol update. You can view more about their details, history, and signature information in Zyxel Encyclopedia. According Gartner report, nearly 95% of ransomware attacks are…
-
Zyxel Threat Intelligence (Release Date: 2021-11-17)
According NTT Monthly Threat Report for August 2021, ransomware has exploded over the past couple of years. We’re likely facing at least a 300% growth in ransomware incidents and payouts over the past two years. Zyxel
keeps malware detection up-to-date.
This article focuses on Cerber Ransomware. Part 2 and 3 will be…
-
Zyxel Threat Intelligence (Release Date: 2021-08-02)
Release Date: 2021-08-02 ZyWALLs latest virus/malware signature update protect you against more malware and threat. See how ZyWALL defends against these threats. You can view more about their details, history, and signature information in Zyxel Encyclopedia. Number of updated signatures: 21385 Highlight Name:…
-
Zyxel Threat Intelligence (Release Date: 2021-05-31)
Release Date:
2021-05-31 ZyWALLs latest virus/malware signature update protect you
against more malware and threat. See how ZyWALL defends against these threats.
You can view more about their details, history, and signature information in Zyxel Encyclopedia. Number of updated signatures: 42375 Total number of…
-
Zyxel Threat Intelligence (Release Date: 2021-04-27)
Release Date:
2021-04-27 ZyWALLs regular updated to the latest virus/malware
signature to protect more malware and threat. See how ZyWALL defends against these
threats. You can view more details, history, and signature information in Zyxel Encyclopedia. Highlight Win32.Lentin Worms automatically spreads itself
over to…
-
Guard against Microsoft Exchange Server Remote Code Execution Vulnerability
CVE-2021-26855 Affected Package: Microsoft Exchange 2013, 2016 and 2019 This vulnerability is part of an attack chain. The initial attack requires the ability to make an untrusted connection to Exchange server port 443. This can be protected against by restricting untrusted connections, or by setting up a VPN to separate…
-
Guard against rConfig
CVE-2019-16622 Network configuration management utility, rConfig is vulnerable to unauthenticated remote command execution (Vulnerable version: rConfig version prior to 3.9.2) rConfig is the popular network management utility for IT staffs to take multiple configuration snapshots of their networks devices. A cybersecurity…
-
Guard against Webmin
CVE-2019-15107Webmin is vulnerable to unauthenticated remote command execution(Vulnerable version: Webmin version 1.882 to 1.921) Webmin is the popular Linux/UNIX systems management UI. The vulnerability is secretly planted by a hacker as a form of backdoor in the development infrastructure and remains in the several…
-
Guard against Zimbra
CVE-2019-9670Vulnerable Zimbra from 8.5 to 8.7.11 Mailboxd component in Synacor Zimbra Collaboration Suite 8.7.x before 8.7.11p10 has an XML External Entity injection (XXE) vulnerability. Impact: This vulnerability could allow an attacker to RCE on an affected Zimbra system. The XML external entity vulnerability in the…
-
Guard against Zombie Poodle
Vulnerable TLS1.2 with CBC cipher suite Zombie POODLE and GOLDENDOODLE are similar to ROBOT, DROWN and many other vulnerabilities affecting HTTPS, these issues stem from continued use of cryptographic modes which should have been long ago deprecated and yet are inexplicably still supported in TLSv1.2. In this case, the…
-
Guard against GoldenDoodle
Vulnerable TLS1.2 with CBC cipher suite Zombie POODLE and GOLDENDOODLE are similar to ROBOT, DROWN and many other vulnerabilities affecting HTTPS, these issues stem from continued use of cryptographic modes which should have been long ago deprecated and yet are inexplicably still supported in TLSv1.2. In this case, the…
-
Guard against use-after-free vulnerability in Google Chrome FileReader API
CVE-2019-5786 Vulnerable Google Chrome before 72.0.3626.121 On March 1st, Google published an advisory for a use-after-free in the Chrome implementation of the FileReader API (CVE 2019-5786). The exploit leads to code execution in the Renderer process, and a second exploit was used to fully compromise the host system.…
-
Guard against BlueKeep
CVE-2019-0708 Vulnerable Windows OS: XP, Vista, 7, Server 2003, and Server 2008 When an unauthenticated attacker connects to the target system using RDP and sends a specially crafted request, they can execute a remote code vulnerability that exists in Remote Desktop Services on older Windows OS versions. This allows the…