January 12, 2023
Threat Intel Report | January 2023

Zero-day vulnerabilities have become more common in recent years, and so have the exploits that leverage them. While more software obviously means more flaws, the rise of the zero-day broker industry is also a major contributor. Their existence has resulted in huge payouts for those who discover and create exploits for zero-day flaws—which has contributed to increased research.

In this month’s Threat Intel Report, we touch on zero-day brokers such as Operation Zero, a Russian platform that recently hiked its price for Signal remote code execution exploits to $1.5 million. What might this tell us about the war in Ukraine? We also cover the future of ransomware, the leak of the FBI InfraGard members database, the Rackspace zero-day hack, the latest trick threat actors are using to get around Microsoft’s macro blockade, and more.

Need help maintaining or improving your security posture? Converge Cybersecurity offers technology solutions and advisory services in the areas of advanced testing, incident response, architecture and integration, strategic staffing, and managed security.

 

Subscribe now and you will also receive access to past issues!

About the Author
CBI, A Converge Company
Threat Intel Group
The Threat Intel Group (TIG) is a critical component of CBI’s Managed Security Services. The TIG’s dedicated team of threat hunters summarize and interpret today’s threats to improve your security posture at scale. Combining globally recognized security methodologies, data and automation with high-level analysis, CBI’s Threat Intel Group provides powerful insights to enhance your organization's security decision-making process. All information is actionable and provides strategic, tactical and operational threat intelligence to raise stakeholders' awareness and embolden proactiveness.
I Need To...