Remove tag threat-analysis
article thumbnail

Cybersecurity Snapshot: CISA Says Midnight Blizzard Swiped U.S. Gov’t Emails During Microsoft Hack, Tells Fed Agencies To Take Immediate Action

Tenable

1 - CISA to federal agencies: Act now to mitigate threat from Midnight Blizzard’s Microsoft email hack Midnight Blizzard, a nation-state hacking group affiliated with the Russian government, stole email messages exchanged between several unnamed U.S. CISA is treating this threat with the intense scrutiny it deserves. And much more!

article thumbnail

Microsoft’s February 2024 Patch Tuesday Addresses 73 CVEs (CVE-2024-21351, CVE-2024-21412)

Tenable

According to Microsoft, this vulnerability has been exploited in the wild as a zero-day, though no specific details about exploitation were available at the time this blog was published. Successful exploitation would bypass SmartScreen security features. All five have been exploited in the wild as zero-days.

LAN 124
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CVE-2023-48788: Critical Fortinet FortiClientEMS SQL Injection Vulnerability

Tenable

Critical At the time this blog was published, Fortinet’s advisory assigned a CVSSv3 score of 9.3 This blog will be updated to reflect the correct CVSSv3 score if the advisory or NVD record are updated. This blog will be updated to reflect the correct CVSSv3 score if the advisory or NVD record are updated.

article thumbnail

How To Secure Your IT, OT and IoT Assets With an Exposure Management Platform: Complete Visibility with Asset Inventory and Discovery

Tenable

Explore how Tenable One for OT/IoT helps organizations stay ahead in today's evolving threat landscape with end-to-end visibility and cyber risk prioritization across IT, OT and IoT. Moreover, real-time visibility enables security teams to proactively mitigate threats before they can escalate into a full-blown crisis.

IoT 70
article thumbnail

Classify and Prioritize Risks with Deep Application Context

Prisma Clud

Some tools provide a limited view of the application landscape, but this forces security teams to manually tag resources to map assets to applications. This bridges the gap between development and security teams, expediting root cause analysis and remediation. The market has attempted to address these issues.

article thumbnail

CVE-2020-6418: Google Chrome Type Confusion Vulnerability Exploited in the Wild

Tenable

It was discovered and reported by Clément Lecigne, security engineer of Google’s Threat Analysis Group (TAG). We will update this blog post if and when this information becomes available. CVE-2020-6418 is a type confusion vulnerability in V8 , Google Chrome’s open-source JavaScript and WebAssembly engine.

Linux 108
article thumbnail

How to Start Threat Hunting

Palo Alto Networks

We’ve just wrapped up our first ever Inside the Hunt Virtual Threat Hunting Summit and were blown away by the fantastic engagement from everyone who attended ( here’s the replay if you missed it). Of the many great questions submitted by the audience, one stood out most prominently: “How do I start threat hunting?”.

How To 97