Category: Vulnerabilities
-
How Can an Attacker Execute Malware through a Script
Learn how script-based attacks work, why it is difficult for traditional antivirus software to detect them, and how to properly detect and mitigate this threat.
-
Detect and Block Exploitation Attempts of the CVE-2024-4577 PHP-CGI Argument Injection Vulnerability
Explore the latest CVE-2024-4577 PHP-CGI Argument Injection vulnerability and learn how to detect and block malicious IPs attempting to exploit it.
-
Investigating Exploit Attacks of the D-Link NAS CVE-2024-3273 Vulnerability
The CVE-2024-3273 exploit for D-Link NAS devices is being used aggressively by botnets hijacking IoT devices. Learn more about this exploit and how to block it.
-
New Surge in VMware Workspace ONE Vulnerability CVE-2022-22954 Exploit Attempts Detected
A recent surge in CVE-2022-22954 exploitation attempts detected by the CrowdSec Network points to a potential new botnet using common vulnerabilities.