Discover key insights on emerging CVEs and exploitation attempts in this month’s CrowdSec VulnTracking Report.
Vulnerabilities
How Can an Attacker Execute Malware through a Script
Learn how script-based attacks work, why it is difficult for traditional antivirus software to detect them, and how to properly detect and mitigate this threat.
Vulnerabilities
Detect and Block Exploitation Attempts of the CVE-2024-4577 PHP-CGI Argument Injection Vulnerability
Explore the latest CVE-2024-4577 PHP-CGI Argument Injection vulnerability and learn how to detect and block malicious IPs attempting to exploit it.
Vulnerabilities
Investigating Exploit Attacks of the D-Link NAS CVE-2024-3273 Vulnerability
The CVE-2024-3273 exploit for D-Link NAS devices is being used aggressively by botnets hijacking IoT devices. Learn more about this exploit and how to block it.
Vulnerabilities
New Surge in VMware Workspace ONE Vulnerability CVE-2022-22954 Exploit Attempts Detected
A recent surge in CVE-2022-22954 exploitation attempts detected by the CrowdSec Network points to a potential new botnet using common vulnerabilities.
Vulnerabilities
Detect Exploitation Attempts of the Looney Tunables Vulnerability in Your System
Brute force attacks are the most prevalent way to exploit the Looney Tunables vulnerability in your system. Here’s how to get notified of such attempts.
Tutorial
Detecting and Stopping Ransomware with CrowdSec
Detects and prevents ransomware spread with CrowdSec. Learn how to configure CrowdSec to block lateral moves on Windows machines effectively.