Remove tag ransomware-attacks
article thumbnail

Frequently Asked Questions for CitrixBleed (CVE-2023-4966)

Tenable

Frequently asked questions relating to a critical vulnerability in Citrix NetScaler that has been under active exploitation for over a month, including by ransomware groups. High We published a blog post for both vulnerabilities on October 18. Double extortion attacks are what have fueled the success of ransomware over the years.

article thumbnail

Microsoft’s February 2024 Patch Tuesday Addresses 73 CVEs (CVE-2024-21351, CVE-2024-21412)

Tenable

An attacker could exploit this vulnerability by convincing a target to open a malicious file. According to Microsoft, this vulnerability has been exploited in the wild as a zero-day, though no specific details about exploitation were available at the time this blog was published. It was assigned a CVSSv3 score of 7.6

LAN 124
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

CVE-2023-48788: Critical Fortinet FortiClientEMS SQL Injection Vulnerability

Tenable

Fortinet warns of a critical SQL Injection vulnerability that could allow an unauthenticated attacker to execute arbitrary code on vulnerable FortiClientEMS software. Critical At the time this blog was published, Fortinet’s advisory assigned a CVSSv3 score of 9.3 and also links to an advisory that is not currently available.

article thumbnail

How To Secure Your IT, OT and IoT Assets With an Exposure Management Platform: Complete Visibility with Asset Inventory and Discovery

Tenable

In the first and second posts of this three-part blog series, we highlighted key challenges that limit the modern enterprise’s ability to protect its OT and IoT assets. Port configuration: Understanding which ports your devices are utilizing helps in assessing potential attack vectors and securing network access points.

IoT 70
article thumbnail

Microsoft’s July 2023 Patch Tuesday Addresses 130 CVEs (CVE-2023-36884)

Tenable

According to researchers at Microsoft, exploitation of CVE-2023-36884 has been attributed to a threat actor known as Storm-0978, also known as DEV-0978 and RomCom, a reference to the backdoor used by the group as part of its attacks. For more information, please refer to Microsoft’s blog post. It was assigned a CVSSv3 score of 8.8

Windows 98
article thumbnail

Enhancing Transportation Cybersecurity and Fleet Management for the DoD

Tenable

Like so many other complex technological systems, OT systems in the DoD’s fleet and transportation systems are vulnerable to attacks from bad actors. In this blog post, we’ll outline the challenges involved in protecting the DoD’s transportation systems from cyberattacks, and offer OT security recommendations.

article thumbnail

Why Cybersecurity Should Be Your Organization’s Top Priority

The Crazy Programmer

After paying my Spectrum TV bill online, I jumped on to a blog about cybersecurity attacks and the need to take it seriously. Tag along to find that out! Issues such as the end of life of the server or a new ransomware attack require a reevaluation of the risk profile. Okay, cybersecurity is important.