Remove tag ransomware
article thumbnail

Frequently Asked Questions for CitrixBleed (CVE-2023-4966)

Tenable

Frequently asked questions relating to a critical vulnerability in Citrix NetScaler that has been under active exploitation for over a month, including by ransomware groups. High We published a blog post for both vulnerabilities on October 18. Double extortion attacks are what have fueled the success of ransomware over the years.

article thumbnail

Microsoft’s February 2024 Patch Tuesday Addresses 73 CVEs (CVE-2024-21351, CVE-2024-21412)

Tenable

According to Microsoft, this vulnerability has been exploited in the wild as a zero-day, though no specific details about exploitation were available at the time this blog was published. Successful exploitation would bypass SmartScreen security features. All five have been exploited in the wild as zero-days.

LAN 126
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

CVE-2023-48788: Critical Fortinet FortiClientEMS SQL Injection Vulnerability

Tenable

Critical At the time this blog was published, Fortinet’s advisory assigned a CVSSv3 score of 9.3 This blog will be updated to reflect the correct CVSSv3 score if the advisory or NVD record are updated. At the time this blog was published, Fortinet’s advisory did not include any messaging about known exploitation of this vulnerability.

article thumbnail

How To Secure Your IT, OT and IoT Assets With an Exposure Management Platform: Complete Visibility with Asset Inventory and Discovery

Tenable

In the first and second posts of this three-part blog series, we highlighted key challenges that limit the modern enterprise’s ability to protect its OT and IoT assets. Device type, make and model, physical location, and network segment can all be used to group and tag assets that are associated with mission critical OT and IoT environments.

IoT 72
article thumbnail

Enhancing Transportation Cybersecurity and Fleet Management for the DoD

Tenable

In this blog post, we’ll outline the challenges involved in protecting the DoD’s transportation systems from cyberattacks, and offer OT security recommendations. Ensuring the security of the DoD's transportation network is certainly a technical challenge - but within the military context, it's also a matter of national security.

article thumbnail

Why Cybersecurity Should Be Your Organization’s Top Priority

The Crazy Programmer

After paying my Spectrum TV bill online, I jumped on to a blog about cybersecurity attacks and the need to take it seriously. Tag along to find that out! Issues such as the end of life of the server or a new ransomware attack require a reevaluation of the risk profile. Okay, cybersecurity is important. Get the Right Support.

article thumbnail

Microsoft’s July 2023 Patch Tuesday Addresses 130 CVEs (CVE-2023-36884)

Tenable

The threat actor is reportedly based out of Russia and is known for conducting ransomware attacks, including extortion-only campaigns, using a ransomware known as Underground. For more information, please refer to Microsoft’s blog post. Exploitation of CVE-2023-36884 began in June 2023. It was assigned a CVSSv3 score of 8.8

Windows 98