New Microsoft Exchange zero-day actively exploited in attacks.
How to remove Antivirus 2009 (Uninstall Instructions).
How to Remove WinFixer / Virtumonde / Msevents / Trojan.vundo?
How to remove Google Redirects or the TDSS, TDL3, or Alureon rootkit using TDSSKiller.
How to install the Microsoft Visual C++ 2015 Runtime
How to remove a Trojan, Virus, Worm, or other Malware
Threat actors are exploiting yet-to-be-disclosed Microsoft Exchange zero-day bugs allowing for remote code execution, according to claims made by security researchers at Vietnamese cybersecurity outfit GTSC, who first spotted and reported the attacks
Trend Micro released a security advisory Thursday evening confirming that they submitted the two new Microsoft Exchange zero-day vulnerabilities discovered by GTSC to Microsoft
There’s reports emerging that a new zero day exists in Microsoft Exchange, and is being actively exploited in the wild
"The version number of these Exchange servers showed that the latest update had already installed, so an exploitation using Proxyshell vulnerability was impossible," the researchers said
"We recommend all organizations/enterprises around the world that are using Microsoft Exchange Server to check, review, and apply the above temporary remedy as soon as possible to avoid potential serious damages," GTSC added
Admins who want to check if their Exchange servers have already been compromised using this exploit can run the following PowerShell command to scan IIS log files for indicators of compromise:
Zero-day in WPGateway Wordpress plugin actively exploited in attacks
Apple backports fix for actively exploited iOS zero-day to older iPhones
Zimbra auth bypass bug exploited to breach over 1,000 servers