article thumbnail

CVE-2024-3400: Zero-Day Vulnerability in Palo Alto Networks PAN-OS GlobalProtect Gateway Exploited in the Wild

Tenable

Background On April 12, Palo Alto Networks released a security advisory for a critical command injection vulnerability affecting PAN-OS, the custom operating system (OS) Palo Alto Networks (PAN) uses in their next-generation firewalls. According to the advisory, this vulnerability impacts PAN-OS versions 10.2,

Network 119
article thumbnail

Governance and Fighting the Curse of Complexity

CIO

Authentication. Plain and simple, all IT purchases should be approved by an IT governance group. Moreover, new sources of ever expanding data produced by generative AI and the unfettered growth of unstructured data introduce even more challenges. There’s the complexity of security in the organization. Password strategies. Encryption.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

CVE-2023-27997: Heap-Based Buffer Overflow in Fortinet FortiOS and FortiProxy SSL-VPN (XORtigate)

Tenable

Medium Analysis CVE-2023-27997 is a heap-based buffer overflow vulnerability in the secure socket layer virtual private network (SSL VPN) functionality in FortiOS and FortiProxy in Fortinet devices including its FortiGate Next Generation Firewalls (NGFW). This is reachable pre-authentication, on every SSL VPN appliance.

Firewall 102
article thumbnail

CVE-2024-21762: Critical Fortinet FortiOS Out-of-Bound Write SSL VPN Vulnerability

Tenable

On February 7, researchers at Fortinet published a blog post highlighting the exploitation of CVE-2022-42475 and CVE-2023-27997 by Chinese threat groups including Volt Typhoon , APT15 (also known as Ke3chang) and APT31 (also known as ZIRCONIUM) as well as UNC757 ( also known as Fox Kitten), which has a “suspected nexus to the Iranian government.”

Malware 121
article thumbnail

Optimizing PCI compliance in financial institutions

CIO

All other needs, for example, authentication, encryption, log management, system configuration, would be treated the same—by using the architectural patterns available. Some of them not only can provide strong authentication, but also have the ability to be used as a secret repository. Data and Information Security

article thumbnail

10 Best Practices to Secure PostgreSQL AWS RDS/Aurora

Datavail

DB Subnet Group with Private Subnets: DB Subnet group is mandatory configuration while creating RDS and each DB subnet group should have subnets in at least two Availability Zones in each AWS Region. Managing Security Groups: VPC security group are like firewall at the subnet level which controls access to DB instances in VPC.

AWS 98
article thumbnail

11 Tips to Keep Your Company’s IT Systems Safe

Invid Group

Consider implementing multi-factor authentication (MFA) wherever possible to enhance security. Use Firewalls and Intrusion Detection Systems Deploy firewalls and intrusion detection systems (IDS) to monitor network traffic and block malicious activities. This knowledge will help you adapt your security strategy accordingly.