🕷️🦹🏻♀️ Villain of the week 🦹🏻♀️🕷️ ℹ️ CVE-2024-49112 is a critical vulnerability in Microsoft Windows' Lightweight Directory Access Protocol (LDAP). It allows unauthenticated attackers to execute arbitrary code remotely by sending specially crafted LDAP requests. Vulnerabilities of this kind are severe and warrant immediate action to mitigate risks. ⚠️ How worried should you be? This vulnerability poses a serious threat due to its remote code execution capabilities and unauthenticated attack vector. Potential consequences include: - Unauthorized control of affected systems. - Data exfiltration and service disruptions. - The possibility of large-scale network compromise. 👷 Recommended actions: ✔️ Audit and detect potential vulnerable systems. ✔️Apply the latest security patches from Microsoft. ✔️ Restrict LDAP access to trusted networks and users only. ✔️ Monitor LDAP traffic for unusual or unauthorized activity. 🐺 Use these scripts from the Vicarius Research Team: 🔗 Detection: https://lnkd.in/gMq5YQgF 🔗 Remediation: https://lnkd.in/gPARCuSY Let us know if you need help securing your systems or understanding these steps further 🤝
Vicarius
Computer and Network Security
New York, NY 14,210 followers
Leading the pack in vulnerability remediation.
About us
Vicarius' vRx bridges the gap between vulnerability discovery and remediation with automated patching, patchless protection, and custom scripting. Trusted by 500+ customers in 60+ countries.
- Website
-
https://vicarius.io
External link for Vicarius
- Industry
- Computer and Network Security
- Company size
- 51-200 employees
- Headquarters
- New York, NY
- Type
- Privately Held
- Founded
- 2016
- Specialties
- Cyber, CDS, Malwares, APT, Capability Driven Security, Application Security, Risk Assessment, Vulnerability Assessment, Security, and Vulnerability Management
Products
vRx
Vulnerability Scanners
Vicarius' vRx is engineered as the most robust vulnerability remediation platform, safeguarding your business against escalating risks. Powered by AI and community-driven insights, our platform delivers native patching, scripting, and patchless protection to keep you safe and secure.
Locations
-
Primary
122 Grand St
New York, NY 10013, US
-
154 Menachem Begin
Tel-Aviv, Tel-Aviv District 6492107, IL
Employees at Vicarius
-
Sebastian Naumann
CEO & Founder, Inline Sales GmbH - Innovation, Incubation, Acceleration
-
Noam Rathaus
Venture Capitalist, active angel investor and former entrepreneur. Founder x4, profitable bootstraps, 1 exit; investor x30+ in Israel, Silicon Valley…
-
Justine Cross
-
Shira Kaplan
Cyber-Security Entrepreneur & Investor | Board Advisor | World Economic Forum Young Global Leader (2017) | Bilanz 100 Digital Shapers "Hall of Fame"
Updates
-
Looks like ol' Saint Nick dropped a little Christmas EP! 💿🎶 🔊 https://lnkd.in/epW58fnQ 🔊 Idk about you, but I'm gonna be doing a whole lot of streaming this holiday season. Let us know what your favorite track is in the comments 👇 Have a Very Merry Hacking Christmas! 🎄
-
Playbooks anyone? 📓 Coach Nahuel gives us the rundown on his strategies he takes to the field 🏈 to win against exposure and tough opponents, aka CVEs. From system hardening for MITRE frameworks to incident response, Nahuel's playbooks are just the beginning of a championship team....which soon could turn into a dynasty 😉
-
🐧😈 Villain of the Week 😈🐧 CVE-2024-43451 is a critical vulnerability in Microsoft Windows, allowing attackers to obtain a user’s NTLMv2 hash with minimal interaction. This can lead to unauthorized access through pass-the-hash attacks, enabling attackers to impersonate users and access sensitive resources without credentials. 😯 How worried should you be? This kind of vulnerability carries a severe risk, with active exploitation reported in the wild. Potential consequences include: ✔ Unauthorized access to network resources. ✔ Credential theft leading to further compromises. ✔ Potential lateral movement and privilege escalation within the environment. 👷♀️ Recommended actions: 1. Detect vulnerable systems: Use our detection script to identify systems at risk of exploitation. 2. Mitigate the issue: - Disable NTLM authentication where possible. - Enforce SMB signing and Kerberos authentication. 3. Monitor Activity: Audit logs for unusual NTLM-related traffic and interception attempts. 👨🔬 Use these scripts from the Vicarius Research Team: 🔗 Detection: https://lnkd.in/g6ptiz9X 🔗 Remediation: https://lnkd.in/gkKdYH6M Let us know if you need help securing your systems or understanding these steps further 🤝
-
Back by popular demand! 🎭 Super Security Bros Nahuel Benitez Ryan Patton return to the stage to continue their scripting tour, unlocking numerous secrets along the way! P.S. They might sing some Christmas carols! 😜🎶
Scripting Part II: Hidden Secrets
www.linkedin.com
-
Have you been naughty or nice this year? 🎅 Well, that's none of my business. But what IS my business is the latest Patch Tuesday release from jolly ol' St. Microsoft. And here's what you need to know 👇📋 Hit the link if you need some assistance ✌️https://lnkd.in/grsSxFHe
-
Two days out from Part 2!! ✌️🎄 If you haven't yet, make sure you register here: https://lnkd.in/gkNCgsdA 🎅🎁🎅🎁🎅🎁 Ryan Patton Nahuel Benitez