Criminal IP The latest news and developments for Cyber Threat Intelligence Reports.
CIP Blog Criminal IP Blog Ā· The latest news and developments for Criminal IP. Cyber Threat Intelligence Reports.
- CVE-2025-24472:Ā Zero-Day Authentication Exposed Vulnerability in Fortinet FortiOS & FortiProxyby Criminal IP on February 21, 2025 at 8:00 am
On February 12, 2025, a zero-day vulnerability (CVE-2025-24472) was discovered in Fortinet FortiOS and FortiProxy. This flaw allows attackers to bypass authentication and gain administrative access without valid credentials. It has been actively exploited in real-world attacks. Fortinet released an emergency patch and urged user to take immediate action. This article explores the vulnerability, real-world […] The post CVE-2025-24472:Ā Zero-Day Authentication Exposed Vulnerability in Fortinet FortiOS & FortiProxy appeared first on CIP Blog.
- [Criminal IP v1.73.0]Ā Regular Maintenance and Update Release Noteby Criminal IP on February 13, 2025 at 10:18 am
An update to Criminal IP v1.73.0 has been released. [Criminal IP v1.73.0] Regular Maintenance and Update Release Note Maintenance Period: 2025.02.13 05:00~10:00 AM (UTC) [New Changes] New API Integration – Fortinet Fortinet is a leading global cybersecurity solutions company that provides a comprehensive and integrated security platform to protect organizations across the digital landscape. Through […] The post [Criminal IP v1.73.0]Ā Regular Maintenance and Update Release Note appeared first on CIP Blog.
- DeepSeekās Popularity Exploited! Malware Distributed via Phishing Websitesby Criminal IP on February 13, 2025 at 3:41 am
The Chinese AI startupĀ DeepSeekĀ has gained attention in the global AI market with its open-source inference model,Ā DeepSeek-R1, which outperforms OpenAIās GPT-01 and offers a more cost-effective alternative to existing models. According to Google Trends, the search volume for DeepSeek surged after the release of theĀ DeepSeek-R1Ā model on January 20, 2025, reaching a peak interest level of ‘100’ […] The post DeepSeekās Popularity Exploited! Malware Distributed via Phishing Websites appeared first on CIP Blog.
- CVE-2023-30799 Vulnerability in MikroTik Routers: Large-Scale Botnet Exploitation and Security Measuresby Criminal IP on February 7, 2025 at 6:00 am
A large-scale botnet exploiting the CVE-2023-30799 vulnerability was recently discovered, raising concerns for MikroTik router users. This vulnerability allows attackers to bypass authentication and escalate privileges, enabling them to take full remote control of the router. Hackers exploiting this vulnerability have been using MikroTik routers to form botnets and carry out various malicious activities. This […] The post CVE-2023-30799 Vulnerability in MikroTik Routers: Large-Scale Botnet Exploitation and Security Measures appeared first on CIP Blog.
- [Criminal IP v1.72.0] 2025-01-23 Release Noteby Criminal IP on January 23, 2025 at 11:00 am
[Criminal IP v1.72.0] 2025-01-23 Release Note An update to Criminal IP v1.72.0 has been released. [Criminal IP v1.72.0] Regular Maintenance and Update Release Note Maintenance Period:Ā 2025.01.23 05:00~10:00 AM (UTC)Ā [New Changes] Announcement Added to the Top Banner of theĀ Criminal IPĀ Paid Plan Page An important update is planned for the paid plans, and an announcement has […] The post [Criminal IP v1.72.0] 2025-01-23 Release Note appeared first on CIP Blog.
- What is Threat Intelligence (TI)?by Criminal IP on January 21, 2025 at 6:18 am
In this article, we will explore threat intelligence, which plays a key role in data-driven cybersecurity decision-making and enables rapid and accurate threat responses. Table of Contents Article Summary Concept and Necessity of Threat Intelligence The Four Key Types of Threat Intelligence The 6-Stage Cycle of Threat Intelligence Current and Future of Threat Intelligence FAQ […] The post What is Threat Intelligence (TI)? appeared first on CIP Blog.
- Oracle WebLogic Server Vulnerability CVE-2020-2883: A 5-Year Threat to Server Controlby Criminal IP on January 17, 2025 at 2:00 am
CVE-2020-2883Ā is a critical security vulnerability in Oracle WebLogic Server that allows remote code execution (RCE), with a CVSS score of 9.8. Initially reported in April 2020, it was added to theĀ CISA Known Exploited Vulnerabilities (KEV) listĀ on January 7, 2025. This indicates that even after five years, the vulnerability remains unpatched in many IT environments and […] The post Oracle WebLogic Server Vulnerability CVE-2020-2883: A 5-Year Threat to Server Control appeared first on CIP Blog.
- [Notice] Advance Announcement of Criminal IP Paid Plan Credit Reduction (Scheduled Release: April 1, 2025)by Criminal IP on January 10, 2025 at 1:22 am
Dear Criminal IP Users,We are providing an advance notice regarding major changes to Criminal IPās paid subscription plans scheduled for the first half of 2025. Changes to Credit Allocations by Criminal IP Plan Criminal IP offers three subscription plansāLite, Medium, and Proādesigned to cater to various usage needs. These plans differ regarding available credits, features, […] The post [Notice] Advance Announcement of Criminal IP Paid Plan Credit Reduction (Scheduled Release: April 1, 2025) appeared first on CIP Blog.
- [Criminal IP v1.71.0] 2025-01-09 Release Noteby Criminal IP on January 10, 2025 at 12:37 am
Ā An update to Criminal IP v1.71.0 has been released. [Criminal IP v1.71.0] Regular Maintenance and Update Release Note Maintenance Period:Ā 2025.01.09 05:00~10:00 AM (UTC)Ā [New Changes] Criminal IPĀ YearlyĀ Plan Release Yearly plans for Criminal IP Lite, Medium, Pro have been released. On theĀ Criminal IP Plans,Ā you can change the payment cycle to ‘Yearly’ or ‘Monthly’ by clicking on […] The post [Criminal IP v1.71.0] 2025-01-09 Release Note appeared first on CIP Blog.
- What is Attack Surface Management (ASM)?by Criminal IP on January 8, 2025 at 8:18 am
Due to the widespread digital transformation through cloud adoption and remote work, the attack surface targeting the cybersecurity of businesses and organizations (hereafter referred to as ābusinessesā) is growing daily. Attack Surface Management (ASM) is a cybersecurity process that proactively and continuously identifies, scans, and monitors IT vulnerabilities from a hackerās perspective. Today, we will […] The post What is Attack Surface Management (ASM)? appeared first on CIP Blog.