article thumbnail

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021

Tenable

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021. International cybersecurity agencies issue a joint alert outlining the top malware strains of 2021. While malware is used for a variety of purposes, the government agencies point out that ransomware is a primary use case. CVE-2018-0798.

Malware 74
article thumbnail

CVE-2024-21762: Critical Fortinet FortiOS Out-of-Bound Write SSL VPN Vulnerability

Tenable

On February 7, researchers at Fortinet published a blog post highlighting the exploitation of CVE-2022-42475 and CVE-2023-27997 by Chinese threat groups including Volt Typhoon , APT15 (also known as Ke3chang) and APT31 (also known as ZIRCONIUM) as well as UNC757 ( also known as Fox Kitten), which has a “suspected nexus to the Iranian government.”

Malware 121
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Snapshot: NIST’s Cybersecurity Framework Gets Major Update, as Advisories on APT29 and ALPHV Blackcat Get Rolled Out

Tenable

And the most prevalent malware in Q4. released in 2018, include an expanded scope beyond critical infrastructure; stronger emphasis on governance; and more guidance, tools and resources to facilitate its implementation. Plus, the latest guidance on cyberattack groups APT29 and ALPHV Blackcat. And much more! came out in 2014.

article thumbnail

Government Advisories Warn of APT Activity Resulting from Russian Invasion of Ukraine

Tenable

The tactical information shared in this blog is designed to help you prepare your digital response to these rapidly unfolding events. CVE-2018-13379. This blog post was published on February 24 and reflects VPR at that time. CVE-2018-13379. Background. Description. Fortinet FortiGate SSL VPN Path Traversal Vulnerability.

article thumbnail

WinRAR Absolute Path Traversal Vulnerability Leads to Remote Code Execution (CVE-2018-20250)

Tenable

A 19-year-old vulnerability in WinRAR’s ACE file format support (CVE-2018-20250) has been identified as part of an attack in the wild. An exploit script was published to Github one day after CPR’s blog post. Possibly the first malware delivered through mail to exploit WinRAR vulnerability. Background. Proof of concept.

Windows 40
article thumbnail

Cybersecurity Snapshot: Critical Infrastructure Orgs Cautioned About Chinese Drones, While Water Plants Advised To Boost Incident Response

Tenable

In addition, the latest on the Androxgh0st malware. Navigating an exceptionally complex landscape, CISOs are having to do more with less and risk personal legal exposure,” reads a blog post about the report. “The 6 - CISA and FBI issue warning about Androxgh0st malware Is the Androxgh0st malware on your radar screen?

article thumbnail

‘BabyShark’ Targets Cryptocurrency Industry

Palo Alto Networks

Palo Alto Networks has discovered that the threat actor behind the BabyShark malware family has expanded its operations beyond conducting espionage to also targeting the cryptocurrency industry. The malware authors internally referred to those two files as “cowboys.”. national security think tank. national security think tank.