Navigating the CVE Transition: Insights on GCVE, CVE Foundation, and Beyond

Advisory: Navigating the CVE Transition

The Common Vulnerabilities and Exposures (CVE) program, managed by MITRE since 1999, has been a cornerstone of global cybersecurity, providing standardized identifiers for vulnerabilities (e.g., CVE-2024-43573). However, the program faced a critical challenge when its funding from the U.S. Department of Homeland Security (DHS) was set to expire on April 16, 2025. A last-minute 30-day…

Read More

Critical CVEs and Associated Threats

Barricade Cyber Solutions Report: Critical CVEs and Associated Threats

This report was prepared by Barricade Cyber Solutions and aims to inform our clients and prospects about critical Common Vulnerabilities and Exposures (CVEs) identified in the CrowdStrike 2025 Global Threat Report. These known critical vulnerabilities pose significant risks; understanding these risks can help protect your systems from emerging cyber threats. Critical CVEs and Associated Threats…

Read More

SPOTREP: Exploitation of Windows CLFS Zero-Day Vulnerability (CVE-2025-29824)

SPOTREP: Exploitation of Windows CLFS Zer-Day Vulnerability, CVE 2025-29824

Vulnerability Details: Zero-day elevation of privilege vulnerability in Windows Common Log File System (CLFS) Tracked as CVE-2025-29824 Allows escalation from standard user to SYSTEM privileges Exploitation Details: Post-compromise exploitation observed against a small number of targets Exploit delivered via PipeMagic malware Used to deploy ransomware payloads Affected Systems/Targets: Known targets include: IT and real estate…

Read More

Situational Awareness Report: CVE-2025-24813 Apache Tomcat RCE

Report: Situational Awareness on Apache Tomcat

Overview CVE-2025-24813 is a critical Remote Code Execution (RCE) vulnerability affecting Apache Tomcat, a widely used open-source web server and servlet container. This vulnerability enables attackers to upload a malicious serialized payload to a vulnerable server, leading to arbitrary code execution through a deserialization flaw under specific conditions. The recent release of a Proof of…

Read More

SPOTREP: SuperBlack Ransomware Campaign

SPOTREP: Super Black Ransomware Campaign

Executive Summary: SuperBlack Ransomware Campaign The SuperBlack ransomware campaign, active since late January 2025, presents a serious threat to organizations utilizing Fortinet firewall appliances. Orchestrated by the threat actor Mora_001, this campaign exploits two critical authentication bypass vulnerabilities—CVE-2025-24472 and an unspecified flaw—to gain super-admin privileges.  Attackers employ WebSocket-based attacks or crafted HTTPS requests to infiltrate…

Read More

Executive Summary: Continued Attacks on USA Law Firms

Executive Summary: Continued Attacks on USA Law Firms

Executive Summary A cybercriminal operating under the alias CeFarir0ne has put up for sale unauthorized Remote Desktop Protocol (RDP) access to an unidentified law firm based in the United States. According to the forum listing, the law firm generates approximately $5 million in annual revenue. The access being sold includes: A user-level domain account One domain controller One domain trust…

Read More

Executive Summary: ShadowSyndicate Threat Group

Executive Summary: Shadow Syndicate Threat Group Update

Executive Summary In late 2024, Darktrace identified multiple instances of RansomHub ransomware attacks linked to the ShadowSyndicate threat group. ShadowSyndicate, active since 2022, has been associated with several ransomware families and sophisticated tools, including Cobalt Strike and Sliver. Their latest collaboration with RansomHub, a rising Ransomware-as-a-Service (RaaS) operator, underscores an evolving threat landscape. This report…

Read More

BianLian Data Extortion Group – Updated Advisory

The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) have released a joint Cybersecurity Advisory detailing the tactics, techniques, and procedures (TTPs) of the BianLian ransomware and data extortion group. This advisory, updated as of November 20, 2024, provides critical…

Read More

Are You Using M365 Co-pilot? Beware of Missing Logs and Hidden Costs

Leveraging M365 Co-pilot’s AI capabilities can be transformative for organizations, but recent insights underscore that logging and auditing around Co-pilot aren’t just optional—they’re crucial for maintaining security, compliance, and enabling effective digital forensics. According to Microsoft’s documentation, M365 Co-pilot and its associated services do not automatically enable comprehensive logging by default. This poses critical concerns…

Read More

RTM – Remote Monitoring & Management (RMM) Tools

Topic: Ransomware Tool Matrix Focus: Remote Monitoring & Management (RMM) Tools An RMM (Remote Monitoring and Management) tool is a type of software used by IT professionals and managed service providers (MSPs) to remotely monitor, manage, and maintain IT systems, networks, and devices. These tools are designed to improve the efficiency of IT operations by…

Read More