Automate Your Security Workflow with Sn1per

5 Ways Sn1per Can Automate Your Security Workflow

If you’re in the security field, you know that there are a lot of moving parts to keep track of. It can be tough to stay on top of everything, and even tougher to find the time to do it all manually. That’s where Sn1per comes in – it’s a tool that helps automate various aspects of your workflow so you can focus on other things. In this blog post, we’ll show you 5 ways Sn1per can help you save time in the process.

(more…)

External Attack Surface Management with Sn1per Enterprise

External Attack Surface Management with Sn1per

In the world of cybersecurity, it’s important to constantly be on the lookout for new threats. One way to do this is by keeping an eye on your organization’s external attack surface. Your external attack surface is the sum total of all the ways a hacker could potentially gain access to your systems—and it’s always changing. That’s why external attack surface management is so important. By monitoring your external attack surface and making sure it’s as secure as possible, you can help protect your organization from a wide range of cyber threats.

(more…)

Sn1per-CVE-2022-26134-detection1

Confluence RCE via OGNL template injection (CVE-2022-26134)

A critical vulnerability affecting the Atlassian Confluence was disclosed and designated CVE-2022-26134 which allows an un-authenticated attacker to execute arbitrary code on vulnerable servers. A number of Proof-of-Concept (PoC) exploits were published online and exploit activity is actively being observed. Given the impact and severity of the vulnerability, Sn1perSecurity has released an out-of-band update to help detect vulnerable servers in your environment using Sn1per Professional and Sn1per Enterprise.

Severity: CRITICAL | Exploit Available: Yes | Exploitability: Easy | Remotely Exploitable: Yes

(more…)

Sn1per-CVE-2022-1388-Scanner1

BIG-IP iControl REST RCE (CVE-2022-1388) Detection with Sn1per Professional

A critical vulnerability affecting the F5 BIG-IP devices was disclosed and designated CVE-2022-1388 which allows an un-authenticated attacker to execute arbitrary code on vulnerable servers. A number of Proof-of-Concept (PoC) exploits were published online and exploit activity is actively being observed. Given the impact and severity of the vulnerability, Sn1perSecurity has released an out-of-band update to help detect vulnerable servers in your environment using Sn1per Professional.

Severity: CRITICAL | Exploit Available: Yes | Exploitability: Easy | Remotely Exploitable: Yes

(more…)

VMware Workspace ONE Access freemarker SSTI (CVE-2022-22954) Detection with Sn1per Professional

Information regarding a critical 0-day vulnerability affecting the VMware Workspace ONE Access and Identity Manager was disclosed and designated CVE-2022-22954 which allows an un-authenticated attacker to execute arbitrary code on vulnerable servers. On April 14th, CISA & US-Cert added CVE-2022-22954 to their catalog of known exploited vulnerabilities after a number of Proof-of-Concept (PoC) exploits were published online and exploit activity was actively observed. Given the impact and severity of the vulnerability, Sn1perSecurity has released an out-of-band update to help detect vulnerable servers in your environment using Sn1per Professional.

Severity: CRITICAL | Exploit Available: Yes | Exploitability: Easy | Remotely Exploitable: Yes

(more…)