A Zero-Day Vulnerability Emerges in Google Chrome

New Google Chrome Zero-Day Vulnerability


The vulnerability tracked as CVE-2022-2856 is a high-severity issue. The flaw has been described as a case of insufficient validation of untrusted input in Intents. This issue which was reported by Ashley Shen and Christian Resell of Google Threat Analysis Group on 2022-07-19, is the 5th zero-day bug in 2022 for Google Chrome. 

(ref. www.bleepingcomputer.com/news/security/google-fixes-fifth-chrome-zero-day-bug-exploited-this-year/)

Recommended Actions for A Zero-Day Vulnerability

Google recommends to update Chrome to the latest version. 

Apple New High-Severity Flaws Are Actively Exploited


Apple urges the iPhone, iPad and MacOS users to update immediately their devices with the latest software versions. The new zero-day vulnerabilities could allow an attacker to gain full administrator rights of a device by exploiting kernel and webkit bugs. In the latest Apple security update, the company says that he new flaws which are tracked as CVE-2022-32894 and CVE-2022-32893, might have been actively exploited.

(ref. https://www.cnn.com/2022/08/18/tech/apple-security-vulnerability-iphone-ipad-mac/index.html)

Recommended Actions for A Zero-Day Vulnerability

It is recommended to apply the latest software versions immediately. (ref. https://support.apple.com/en-us/HT213412)

Microsoft Disrupts SEABORGIUM’s Ongoing Phishing Operations


Microsoft describes the threat as a highly persistent threat actor that originates from Russia, with objectives and victimology that align closely with Russian state interests. SEABORGIUM’s tactic is to slowly infiltrate targeted organizations’ social networks through constant impersonation, rapport building, and phishing to deepen their intrusion. Since the beginning of 2022, Microsoft has observed SEABORGIUM campaigns targeting over 30 organizations, in addition to personal accounts of people of interest. The ability to detect and track the threat actors’ tactics and IOCs has enabled Microsoft to disable accounts used by the actor for reconnaissance, phishing, and email collection. Microsoft Defender SmartScreen has also implemented detections against the phishing domains represented in SEABORGIUM’s activities.

(ref. https://thehackernews.com/2022/08/microsoft-warns-about-phishing-attacks.html)

Indicators Of Compromise (IOCs)

cache-dns[.]comDomain nameHigh
cache-dns-forwarding[.]comDomain nameHigh
cache-dns-preview[.]comDomain nameHigh
cloud-docs[.]comDomain nameHigh
document-forwarding[.]comDomain nameHigh
goo-link[.]onlineDomain nameHigh
y-ml[.]coDomain nameHigh

Advanced Hunting Queries for Microsoft Sentinel https://github.com/Azure/Azure-Sentinel/blob/master/Detections/MultipleDataSources/SEABORGIUMDomainsAugust2022.yaml

Advanced Hunting Queries for Defender365 https://github.com/Azure/Azure-


Recommended Actions for A Zero-Day Vulnerability

Check your Office 365 email filtering settings to ensure you block spoofed emails, spam, and emails with malware.

Configure Office 365 to disable email auto-forwarding.

Use the included indicators of compromise to investigate whether they exist in your environment and assess for potential intrusion. Review all authentication activity for remote access infrastructure, with a particular focus on accounts configured with single factor authentication, to confirm authenticity and investigate any anomalous activity.

Require multifactor authentication (MFA) for all users coming from all locations including perceived trusted environments, and all internet-facing infrastructure–even those coming from on-premises systems.

Leverage more secure implementations such as FIDO Tokens, or Microsoft Authenticator with number matching. Avoid telephony-based MFA methods to avoid risks associated with SIM-jacking.

(ref. https://www.microsoft.com/security/blog/2022/08/15/disrupting-seaborgiums-ongoing-phishing-operations/)

Call-Back Social Engineering Techniques On the Rise


Ex-members of the infamous group Conti have been adopting call-back phishing tactics as the primary method to gain initial access. Bazar-call is a popular call-back method which was first seen in 2021. This attack tries to convince the victims to call back the hackers by sending them fake subscription notices and start a Zoho remote session with them. Once the remote session is successful, the threat actors are able to install malicious software and intrude further into the network. The cyber intelligence firm AdvIntel reports that they have found evidence of three groups, all part of the former Conti ransomware operation, that used BazarCall or a version of those tactics: Silent Ransom Group, Quantum, and Roy/Zeon. 

(ref. https://www.bleepingcomputer.com/news/security/ransomware-gangs-move-to-callback-social-engineering-attacks/)

Recommended Actions for A Zero-Day Vulnerability

Please educate your users about social engineering attacks. 

Investigate DNS requests from remote access tooling such as Zoho.

Palo Alto Networks: New high severity flaw


Palo Alto Networks recently issued a security advisory regarding an actively exploited vulnerability in the wild. This newly discovered flaw, identified as CVE-2022-0028 (CVSS v3 – 8.6), impacts the operating system utilized in the company’s networking hardware products.This bug is a URL filtering policy misconfiguration that could allow an unauthenticated, remote attacker to carry out amplified TCP denial-ofservice (DoS) attacks. 

(ref. https://www.bleepingcomputer.com/news/security/palo-alto-networks-new-pan-os-ddos-flaw-exploited-in-attacks/) The PAN-OS versions vulnerable to this vulnerability are the following:

  • PAN-OS prior to 10.2.2-h2
  • PAN-OS prior to 10.1.6-h6
  • PAN-OS prior to 10.0.11-h1
  • PAN-OS prior to 9.1.14-h4
  • PAN-OS prior to 9.0.16-h3
  • PAN-OS prior to 8.1.23-h1

Recommended Actions for A Zero-Day Vulnerability

It is recommended to apply the official patch from Palo Alto immediately. (ref. https://security.paloaltonetworks.com/CVE-2022-0028)

Threat Advisory: Protecting Your Digital World

Stay Informed. Stay Safe.



https://www.bleepingcomputer.com/news/security/google-fixes-fifth-chrome-zero-day-bug-exploited-this-year/ https://thehackernews.com/2022/08/new-google-chrome-zero-day.html

https://www.cnn.com/2022/08/18/tech/apple-security-vulnerability-iphone-ipad-mac/index.html https://support.apple.com/en-us/HT201222

https://www.microsoft.com/security/blog/2022/08/15/disrupting-seaborgiums-ongoing-phishing-operations/ https://thehackernews.com/2022/08/microsoft-warns-about-phishing-attacks.html https://www.bleepingcomputer.com/news/security/hackers-impersonate-cybersecurity-firms-in-callback-phishing-attacks/




Our Partners

Penetration Testing Whitepaper

Threat Intelligence

Subscribe to receive insider threat intelligence from Difenda’s front line security analysts in our 24/7/365 SOC.

Ken Perkins

Biography coming soon.

Megan Miller

Megan Miller’s energy and passion for learning flow into all aspects of her work. As the Growth Manager, North America, she brings a background in sciences which she has transitioned to the tech sector in her role at Difenda.

With a Bachelors of Science in Geology, Megan is a lifelong learner who is voracious about learning anything she can get her hands on about cybersecurity. Her positive energy has built a sales strategy with a focus on expanding in the United States while nurturing the Canadian presence. She is responsible for recruiting and training the sales team. Together with the company’s leadership, she creates the sales process and the company’s product strategy in order to better serve the customer base. This ensures that our customers have a highly trained and highly motivated team to help them every step of the way, Megan has completed Microsoft SC-900 training and working towards mastering Microsoft.

Whether at work or play, Megan is fully committed. She took her love of hockey all the way to the semi-professional level as a competitive hockey player. Megan loves all things sports including water skiing, scuba diving, cycling, and snowboarding. She also enjoys time with family and reading about alternative energy, innovation, and cybersecurity.

Natasha Phanor

As the Microsoft Partner Manager at Difenda, Natasha Phanor is responsible for driving growth within our Microsoft Partnership. With six years in the industry, she offers a fresh, energetic approach, and the ability to focus on our customer’s needs throughout the entire process. Natasha has the innate ability to foresee customer needs and solve problems before they arise, which creates a smooth road for each customer she encounters.

As the recipient of the Outstanding Services Partner of the Year Award in 2018, it is clear that Natasha responds quickly to customer needs, creates a platform for understanding a customer’s business requirements, and walks them through the process to ensure their complete satisfaction.

In her spare time, Natasha is as energetic and passionate as she is on the job. A self-proclaimed foodie-extraordinaire, she enjoys dinner parties, traveling, downhill skiing, hiking, biking, and reading. Natasha has a Bachelor of Fine Arts, specializing in Dance, from Ryerson University.

Lisa Templeton

Lisa Templeton is the perfect combination of human empathy and technological prowess. In her role as People Services Manager, she takes care of our team members to support them in their daily work, as well as on their personal life paths. Happy employees make for happy customers, and Lisa excels in giving our employees the tools they need for success in order to become the best possible versions of themselves. Along with employee formation, she shines in the service delivery support domain to continuously improve the process. Her 24 years of experience in IT Operations and Service Management help her create quality and efficiency at Difenda.

Having attended the Information Systems Management certificate program at Ryerson University, and with various other certifications to her credit, Lisa is perceptive and innovative when it comes to information technology, but also sensitive to the needs of her human constituents. Responsible for achieving the first privately owned company HDI Support Center certification in Canada, she has also designed and implemented Service Management excellence programs and 24×7 IT Operations departments for multiple IT organizations, and has created corporate rewards and recognition programs to keep her employees engaged and motivated.

On the personal side, Lisa passionately supports the cause of breast cancer research, having lost her mother to the disease. She reads voraciously in her spare time, and enjoys the art of home renovation. The summer months also bring time on her boat and exploring new hiking trails.

Miranda McCurdy

Miranda McCurdy uses her myriad super powers in all aspects of her job and personal life. As the Marketing Director at Difenda, Miranda McCurdy brings over a decade of experience to the table, which includes expertise in all facets of operations, brand management, and content marketing, as well as a multitude of successful strategies for the ever-expanding digital world. She is an expert at simplifying the message the company is trying to send, filling in gaps in the information, and strengthening the content in order to create compelling narratives that strengthen the brand and developing programs that bring teams together.

With several Addy Awards issued by the American Advertising Federation Cleveland to her credit, and her never say die attitude, Miranda understands both the broader picture and the minute details that are needed to successfully market a product. With her abilities to harness both the talent needed to spread the message, as well as to create the message itself, she is an integral cog in the company’s ability to communicate with customers and other stakeholders.

When she is not building a brand, she shares her ability to fill the gaps in her community by volunteering with Habitat for Humanity, the Special Olympics, and the Charleston Food Bank. In her spare time, Miranda spends time with her family, enjoys fitness and health, paddle boarding, reading, and arts and crafts.

Juliana Zaremba

Connections are the name of the game for Juliana Zaremba. As Strategic Partnerships Director, she is responsible for Difenda’s channel partnerships and the development and ownership of the channel partner program. She is also responsible for the global Microsoft Partnership, including the creation of strategic plans with MSFT contacts that will facilitate the continued growth of the business and establish certification and training protocols in all security technologies. Her role is multifaceted, as she acquires partners, manages relationships with them, and develops strategies that will provide cutting edge security solutions to our customer base. Another integral aspect of her job is to facilitate growth.

With a Bachelor’s in Math from the University of Waterloo and 14 years of experience from her previous roles at Herjavec Group and CDW, her cutting edge focus and ability to develop long-lasting relationships and strategies provides world class security solutions to our customer base.

Juliana thrives on connections outside of work as well. She is a philanthropist and contributor with Women4Change based in Hamilton. This group of local women is passionate about supporting local causes, and she focuses her efforts around Women in STEM. She is also a member of Club Italia in Niagara Falls and supports their youth events throughout the year.

When not managing the Microsoft Global partnership, Juliana enjoys reading, often reading several books at once. Juliana enjoys exploring the Niagara Escarpment with her family, as well as sharing meals and experiences with her extended family. Juliana’s competitive nature has her always trying new things, like Whoop band challenges and Peloton.

Jeffry Jacob

Biography Coming Soon