{"uuid": "721b04ec-5eea-4f05-b6ff-c14190908f79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26134", "type": "published-proof-of-concept", "source": "https://t.me/TopCyberTechNews/30", "content": "Top Security News for 07/06/2022\n\nSolid-state batteries for EVs move a step closer to production\nhttps://arstechnica.com/?p=1858366 \n\nRussia seeks to hijack German telescope on its X-ray spacecraft\nhttps://arstechnica.com/?p=1858353 \n\nObserved In The Wild: Atlassian Confluence Server CVE-2022-26134\nhttps://www.reddit.com/r/netsec/comments/v6iia0/observed_in_the_wild_atlassian_confluence_server/ \n\nMicrosoft Seizes 41 Domains Used in Spear-Phishing Attacks by Bohrium Hackers\nhttps://thehackernews.com/2022/06/microsoft-seizes-41-domains-used-in.html \n\nPopping Eagle: How Global Analytics Uncovered a Stealthy Threat Actor\nhttps://www.reddit.com/r/netsec/comments/v4aspa/popping_eagle_how_global_analytics_uncovered_a/ \n\nPasswordstate - Revoked its Digicert certificate used to sign the code\nhttps://www.reddit.com/r/netsec/comments/v5xl0o/passwordstate_revoked_its_digicert_certificate/ \n\nUkraine's SSSCIP discusses the cyber phases of Russia's war. Atlassian patches Confluence;. State actor exploits Follina.\nhttps://thecyberwire.com/newsletters/daily-briefing/11/108 \n\nBig Tech pulls out all the stops to halt \u201cself-preferencing\u201d antitrust bill\nhttps://arstechnica.com/?p=1858462 \n\nMicrosoft Autopatch is here\u2026but can you use it?\nhttps://blog.malwarebytes.com/business-2/2022/06/microsoft-autopatch-is-here-but-can-you-use-it/ \n\nState-Backed Hackers Exploit Microsoft 'Follina' Bug to Target Entities in Europe and U.S\nhttps://thehackernews.com/2022/06/state-backed-hackers-exploit-microsoft.html \n\n    \nFollow Top Cyber News at https://t.me/TopCyberTechNews\nFeel free to DM me at https://twitter.com/ShayaFeedman", "creation_timestamp": "2022-06-07T02:00:05.000000Z"}