Remove Blog Remove Government Remove Malware Remove Operating System
article thumbnail

CVE-2024-21762: Critical Fortinet FortiOS Out-of-Bound Write SSL VPN Vulnerability

Tenable

Fortinet warns of “potentially” exploited flaw in the SSL VPN functionality of FortiOS, as government agencies warn of pre-positioning by Chinese state-sponsored threat actors in U.S. Proof of concept At the time this blog post was published on February 9, no public proof-of-concept (PoC) exploit for CVE-2024-21762 was available.

Malware 121
article thumbnail

Cybersecurity Snapshot: Critical Infrastructure Orgs Cautioned About Chinese Drones, While Water Plants Advised To Boost Incident Response

Tenable

In addition, the latest on the Androxgh0st malware. government to critical infrastructure organizations: If the drones you’re using were made in China, be careful. These drones represent a “significant risk” because the data they collect could end up in the hands of the Chinese government, the U.S. And much more! The upside?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

CVE-2021-22893: Zero-Day Vulnerability in Pulse Connect Secure Exploited in the Wild

Tenable

In addition to the advisory, Pulse Secure also published a blog post detailing observed exploit behavior related to the zero-day as well others linked to previously disclosed vulnerabilities in its Pulse Connect Secure solution. This blog post was published on April 8 and reflects VPR at that time. Description. Description. Privileges.

article thumbnail

Cybersecurity Snapshot: Cyber Agencies Offer Secure AI Tips, while Stanford Issues In-Depth AI Trends Analysis, Including of AI Security

Tenable

The report, divided into nine chapters, covers topics including research and development; technical performance; responsible AI; and policy and governance. CIS offers Benchmarks for cloud platforms; databases; desktop and server software; mobile devices; operating systems; and more.

article thumbnail

Fighting Ransomware: Using Ivanti’s Platform to Build a Resilient Zero Trust Security Defense

Ivanti

Ransomware is a strain of malware that blocks users (or a company) from accessing their personal data or apps on infected iOS, iPadOS, and Android mobile devices, macOS laptops, Windows personal computers and servers, and Linux servers. Communications : The malware scans the contents of the SD card.

Malware 98
article thumbnail

Solorigate: SolarWinds Orion Platform Contained a Backdoor Since March 2020 (SUNBURST)

Tenable

Nation-state threat actors breached the supply chain of a popular IT management software provider in order to infiltrate government agencies and private companies. government agencies were the victims of a significant breach reportedly linked to hackers associated with a nation-state. Background. link] 0J7kzPt1ti. — BusinessLayer.dll.

Security 118
article thumbnail

CISA Adds Vulnerabilities Exploitable Via Bluetooth to KEV

Tenable

CISA posted a blog on September 18 detailing how it prioritizes additions to the KEV catalog. For the second, the CISA blog notes that its “analysts need evidence that threat actors are actively exploiting the vulnerability in the wild. These vary across operating systems and architectures. Image source: Owl Labs, Sept.

Malware 63