Category: Vulnerabilities
-
How Can an Attacker Execute Malware through a Script
Learn how script-based attacks work, why it is difficult for traditional antivirus software to detect them, and how to properly detect and mitigate this threat.
-
Detect and Block Exploitation Attempts of the CVE-2024-4577 PHP-CGI Argument Injection Vulnerability
Explore the latest CVE-2024-4577 PHP-CGI Argument Injection vulnerability and learn how to detect and block malicious IPs attempting to exploit it.
-
Investigating Exploit Attacks of the D-Link NAS CVE-2024-3273 Vulnerability
The CVE-2024-3273 exploit for D-Link NAS devices is being used aggressively by botnets hijacking IoT devices. Learn more about this exploit and how to block it.
-
New Surge in VMware Workspace ONE Vulnerability CVE-2022-22954 Exploit Attempts Detected
A recent surge in CVE-2022-22954 exploitation attempts detected by the CrowdSec Network points to a potential new botnet using common vulnerabilities.
-
Detect Exploitation Attempts of the Looney Tunables Vulnerability in Your System
Brute force attacks are the most prevalent way to exploit the Looney Tunables vulnerability in your system. Here’s how to get notified of such attempts.
-
Detecting and Stopping Ransomware with CrowdSec
Detects and prevents ransomware spread with CrowdSec. Learn how to configure CrowdSec to block lateral moves on Windows machines effectively.