Remove Authentication Remove Blog Remove Malware Remove Operating System
article thumbnail

CVE-2024-21762: Critical Fortinet FortiOS Out-of-Bound Write SSL VPN Vulnerability

Tenable

critical infrastructure through exploitation of known vulnerabilities Background On February 8, Fortinet published an advisory (FG-IR-24-015) to address a critical flaw in FortiOS, its network operating system. CVE Description CVSSv3 Severity CVE-2024-21762 Fortinet FortiOS Out-of-bound Write Vulnerability in sslvpnd 9.6

Malware 121
article thumbnail

CVE-2021-22893: Zero-Day Vulnerability in Pulse Connect Secure Exploited in the Wild

Tenable

In addition to the advisory, Pulse Secure also published a blog post detailing observed exploit behavior related to the zero-day as well others linked to previously disclosed vulnerabilities in its Pulse Connect Secure solution. Pulse Connect Secure Authentication Bypass Vulnerability. Authenticated. Authenticated.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA Adds Vulnerabilities Exploitable Via Bluetooth to KEV

Tenable

CVE-2022-31461 Owl Labs Meeting Owl Missing Authentication for Critical Function Vulnerability 7.4 CVE-2022-31463 Owl Labs Meeting Owl Improper Authentication Vulnerability 8.2 CISA posted a blog on September 18 detailing how it prioritizes additions to the KEV catalog. These vary across operating systems and architectures.

Malware 63
article thumbnail

CVE-2020-12271: Zero-Day SQL Injection Vulnerability in Sophos XG Firewall Exploited in the Wild

Tenable

They discovered that this also affected systems when the port used for the administration interface or user portal was also used to expose a firewall service, such as the SSL VPN. CVE-2020-12271 is a pre-authentication SQL injection vulnerability that exists in the Sophos XG Firewall/Sophos Firewall Operating System (SFOS).

Firewall 101
article thumbnail

Fighting Ransomware: Using Ivanti’s Platform to Build a Resilient Zero Trust Security Defense

Ivanti

Ransomware is a strain of malware that blocks users (or a company) from accessing their personal data or apps on infected iOS, iPadOS, and Android mobile devices, macOS laptops, Windows personal computers and servers, and Linux servers. Communications : The malware scans the contents of the SD card. Devices running versions from 2.2

Malware 98
article thumbnail

Cyber Hygiene: Keep Your Business Safe Online

MagmaLabs

As a result, your data gets secured and protected from malware, other attacks, or security breaches. Some cyber hygiene best practices include the following: Installing antivirus and malware software. Setting stronger passwords and using multi-factor authentication. Regularly updating web browsers, apps, and operating systems.

Malware 98
article thumbnail

Cybersecurity Snapshot: Tips for cloud configs, MSP vetting, CISO board presentations

Tenable

Block legacy authentication protocols. How to Choose a Modern CSPM Tool to Reduce Your Cloud Infrastructure Risk ” (Tenable blog). “ Privilege account management, including role-based access and authentication management. Systems management. 6 - And here’s the CIS top 10 malware list for September. Kinda, sorta.

Cloud 52