#cve202553770 — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #cve202553770, aggregated by home.social.
-
A single SharePoint flaw unleashed a global cyber takeover—hackers are seizing control even before patches hit. How safe is your system? Dive into the details of the ToolShell vulnerability.
-
Out now! 👉 Our latest #GraylogLabs post on the exploitation of the SharePoint RCE. CVE-2025-53770 and CVE-2025-53771 are critical remote code execution vulnerabilities (CVSS base score 9.8) impacting #Microsoft #SharePoint. In this blog, we simulate the exploitation of this SharePoint RCE vulnerability and analyze the resulting telemetry inside #Graylog. 📊
Read an overview on this attack, follow along as we emulate the adversary SharePoint RCE, explain the requirements to detect this exploit, review indicators, and more. Plus, learn about actionable threat hunting and detection strategies.👇
https://graylog.org/post/adversary-tradecraft-exploitation-of-the-sharepoint-rce/ #SharePointRCE #CVE #cybersecurity #CVE202553770 #CVE202553771
-
Recently having some #Sharepoint #cve202553770 cases.
Hint for analysts: also check for Visual Basic and C# not just PowerShell.
-
#Microsoft #SharePoint #Server is under attack from a #criticalvulnerability, #CVE202553770, allowing attackers to gain #access and #control of #servers without authentication. There is currently #nopatch available, and Microsoft advises configuring Antimalware Scan Interface integration and deploying Defender AV on all SharePoint servers. https://www.forbes.com/sites/daveywinder/2025/07/20/microsoft-confirms-ongoing-mass-sharepoint-attack---no-patch-available/?eicker.news #tech #media #news
-
Okay, FFS. We now have concurrent exploitation for:
The only thing missing is some Ivanti PulseSecure shite, and we’ve got a full house.