HomeCII/OTSummary of the week: Vulnerability in 48k Fortinet firewalls allows attackers to...

Summary of the week: Vulnerability in 48k Fortinet firewalls allows attackers to exploit, organizations targeted with “vishing” through Microsoft Teams

Published on

spot_img

Last week, significant cybersecurity news, articles, interviews, and videos caught the attention of industry professionals and security enthusiasts. Among these highlights were reports of over 48,000 internet-facing Fortinet firewalls still vulnerable to attacks, despite warnings about a critical vulnerability affecting Fortigate firewalls.

The Shadowserver Foundation data revealed that these vulnerable devices are still accessible from the Internet, leaving them open to potential attacks. This news serves as a stark reminder of the importance of prioritizing cybersecurity measures and promptly addressing known vulnerabilities to protect sensitive data and critical infrastructure.

In another concerning development, ransomware attackers were reported to be using a combination of “vishing” tactics and posing as tech support via Microsoft Teams to target organizations. This strategy has proven to be successful for threat actors looking to deliver ransomware and underscores the need for enhanced cybersecurity awareness and training within organizations.

Additionally, a stealthy attack campaign was uncovered, where Juniper enterprise routers were backdoored via “magic packet” malware. This attack method allowed threat actors to turn these routers into entry points for corporate networks, demonstrating the sophistication and evolving nature of cyber threats targeting businesses and organizations.

Furthermore, Cisco released patches to address critical vulnerabilities, including a privilege escalation flaw in Meeting Management and a heap-based buffer overflow in ClamAV. These vulnerabilities could potentially lead to the termination of the ClamAV scanning process on endpoints, highlighting the importance of timely patching and proactive security measures.

The intersection of cyber and physical security threats was also discussed in an interview with Nicholas Jackson, Director of Cyber Operations at Bitdefender. Technologies like AI, quantum computing, and IoT are reshaping cybersecurity, presenting both opportunities and challenges for security professionals and organizations.

Moreover, a critical zero-day vulnerability affecting SonicWall Secure Mobile Access (SMA) 1000 Series appliances was exploited by attackers, further emphasizing the need for robust cybersecurity defenses and proactive threat intelligence to mitigate risks and protect sensitive data.

In a positive development, Arunava Bag, CTO at Digitate, shared insights on how AI-driven strategies can transform security preparedness and recovery after an incident. By prioritizing cybersecurity frameworks and adopting effective strategies, organizations can enhance their resilience against cyber threats and minimize the impact of potential breaches.

Overall, last week’s cybersecurity news and developments underscore the evolving nature of cyber threats and the importance of staying vigilant, informed, and proactive in defending against malicious activities and safeguarding digital assets. As the cybersecurity landscape continues to evolve, organizations and security professionals must adapt and implement robust security measures to mitigate risks and protect against cyber attacks.

Source link

Latest articles

Trojanized PyPI AI Proxy Steals Claude Prompts and Exfiltrates Data

The Menace of the Malicious PyPI Package: "hermes-px" In a startling revelation, the security team...

Meaningful Metrics Show the Value of Cyber-Resiliency

The Unfolding Landscape of Cybersecurity: An Examination of Cyber-Resilience In today's digital age, business leaders...

Escaping the COTS Trap – CSO Online

In recent years, the landscape of enterprise cybersecurity has become increasingly complex, largely due...

More like this

Trojanized PyPI AI Proxy Steals Claude Prompts and Exfiltrates Data

The Menace of the Malicious PyPI Package: "hermes-px" In a startling revelation, the security team...

Meaningful Metrics Show the Value of Cyber-Resiliency

The Unfolding Landscape of Cybersecurity: An Examination of Cyber-Resilience In today's digital age, business leaders...