Remove 2022 Remove Infrastructure Remove Malware Remove Operating System
article thumbnail

CVE-2024-21762: Critical Fortinet FortiOS Out-of-Bound Write SSL VPN Vulnerability

Tenable

critical infrastructure through exploitation of known vulnerabilities Background On February 8, Fortinet published an advisory (FG-IR-24-015) to address a critical flaw in FortiOS, its network operating system. CVE Description CVSSv3 Severity CVE-2024-21762 Fortinet FortiOS Out-of-bound Write Vulnerability in sslvpnd 9.6

Malware 122
article thumbnail

Cybersecurity Snapshot: Critical Infrastructure Orgs Cautioned About Chinese Drones, While Water Plants Advised To Boost Incident Response

Tenable

Find out why Uncle Sam is warning critical infrastructure facilities about drones made in China, while urging water treatment plants to beef up incident response plans. In addition, the latest on the Androxgh0st malware. 1 - Critical infrastructure orgs warned about using Chinese drones Here’s a warning from the U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FBI and CISA Release Cybersecurity Advisory on Royal Ransomware Group

Tenable

Background As part of their #StopRansomware campaign, the Federal Bureau of Investigation and Cybersecurity and Infrastructure Security Agency have released a cybersecurity advisory (CSA) discussing the Royal ransomware group. Analysis When the threat actor behind Royal emerged in January 2022, it was using the ALPHV/BlackCat ransomware.

Groups 96
article thumbnail

Critical infrastructure is more vulnerable than ever—your industry could be a prime target

Lacework

One of the only major changes in cybercriminal operations is who their victims are—today, instead of targeting individuals, they’re targeting critical infrastructure. So, why did this shift occur, and which types of critical infrastructure are most at risk? Critical infrastructure is organized into 16 different sectors.

article thumbnail

CISA Adds Vulnerabilities Exploitable Via Bluetooth to KEV

Tenable

Cybersecurity and Infrastructure Security Agency (CISA) added eight vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog , including four vulnerabilities for Owl Labs Meeting Owl. CVE Description CVSSv3 CVE-2022-31459 Owl Labs Meeting Owl Inadequate Encryption Strength Vulnerability 7.4 On September 18, the U.S.

Malware 64
article thumbnail

South Korean and American Agencies Release Joint Advisory on North Korean Ransomware

Tenable

South Korean and American Agencies Release Joint Advisory on North Korean Ransomware Several South Korean and American agencies have released a joint cybersecurity advisory on North Korean state-sponsored ransomware operators. As of October 1 2022, 72% of organizations remained vulnerable to Log4Shell. kr and xpopup[.]com.

article thumbnail

Cybersecurity Snapshot: Cyber Agencies Offer Secure AI Tips, while Stanford Issues In-Depth AI Trends Analysis, Including of AI Security

Tenable

“Deploying AI systems securely requires careful setup and configuration that depends on the complexity of the AI system, the resources required (e.g., funding, technical expertise), and the infrastructure used (i.e., CIS Microsoft SQL Server 2022 Benchmark v1.1.0 CIS Microsoft Windows Server 2022 Benchmark v3.0.0