HomeCII/OTWeek in review: Over 87,000 Fortinet devices vulnerable to attack, red teaming...

Week in review: Over 87,000 Fortinet devices vulnerable to attack, red teaming tool employed to evade EDR

Published on

spot_img

In the cyber world, staying updated with the latest news, vulnerabilities, and security tools is crucial to staying ahead of potential threats. Last week, the cybersecurity landscape saw a variety of developments that highlighted the ongoing battle between cyber attackers and defenders.

One significant piece of news that emerged was the identification of over 87,000 Fortinet devices still vulnerable to attacks due to CVE-2024-23113. The Critical vulnerability allows unauthenticated remote code/command execution on unpatched Fortinet FortiGate firewalls, making them prime targets for malicious actors. With CISA adding this vulnerability to its catalog of Known Exploited Vulnerabilities, it underscores the urgency for organizations to secure their networks promptly.

Another concerning trend observed by Trend Micro researchers was the deployment of the red teaming tool EDRSilencer by threat actors to evade endpoint detection and response systems. This tactic demonstrates the evolving tactics used by cybercriminals to bypass traditional security measures and highlights the need for organizations to constantly adapt their security strategies.

On a more positive note, the cybersecurity community also saw the introduction of GhostStrike, an open-source tool designed for ethical hacking and Red Team operations. Tools like GhostStrike provide security professionals with valuable resources to test and improve the security posture of their systems, ultimately contributing to a more robust defense against cyber threats.

In a thought-provoking interview, Fyodor Yarochkin, Senior Threat Solution Architect at Trend Micro, shed light on the role of compromised cyber-physical devices in modern cyberattacks. By understanding the infrastructure used by attackers, security teams can gain insights into their motives and tactics, enabling them to better protect their networks.

However, not all cyber activities are carried out with malicious intent. Mick Baccio, Global Security Advisor at Splunk SURGe, discussed the implications of the NIS2 Directive on various sectors beyond traditional IT security. The Directive aims to enhance the cybersecurity resilience of critical infrastructure, emphasizing the need for a comprehensive approach to security across different industries.

In a concerning development, attackers attempted to deliver wiper malware to organizations in Israel by impersonating cybersecurity company ESET via email. This incident underscores the importance of robust email security protocols and user awareness training to prevent successful phishing attacks that can lead to destructive consequences.

The cybersecurity industry also faced challenges related to API security, AI data collection, and the need for enhanced network security. As technology continues to advance, so do the tactics used by cybercriminals, necessitating constant vigilance and innovation from security professionals.

As we navigate the ever-changing cybersecurity landscape, it becomes apparent that staying informed and proactive is essential to mitigating risks and safeguarding critical data and infrastructure. The battle between cyber attackers and defenders is ongoing, but with the right tools, strategies, and mindset, organizations can bolster their defenses and effectively combat evolving threats.

Source link

Latest articles

Push for Digital Sovereignty: Essential Insights for CISOs

In early 2026, the French government made a significant announcement that sent ripples throughout...

How Integrated GIS Powers the Next Generation of Industrial Cyber Resilience

The Evolution of Cybersecurity: Bridging the Gap Between GIS and IT/OT Systems In an era...

Cyber Briefing – April 23, 2026 – CyberMaterial

Cybersecurity Update: Emergence of New Threats and Institutional Reactions The cybersecurity landscape continues to evolve...

Apple Resolves iOS Notification Issue Revealing Deleted Messages

Apple Issues Emergency Update to Address Notification Services Vulnerability In a significant move to enhance...

More like this

Push for Digital Sovereignty: Essential Insights for CISOs

In early 2026, the French government made a significant announcement that sent ripples throughout...

How Integrated GIS Powers the Next Generation of Industrial Cyber Resilience

The Evolution of Cybersecurity: Bridging the Gap Between GIS and IT/OT Systems In an era...

Cyber Briefing – April 23, 2026 – CyberMaterial

Cybersecurity Update: Emergence of New Threats and Institutional Reactions The cybersecurity landscape continues to evolve...