article thumbnail

VulnRecap 2/12/24: Ivanti, JetBrains, Fortinet, Linux Issues

eSecurity Planet

Orca Security published a blog post about the vulnerabilities — its researchers discovered and reported the issues in Fall 2023, and Microsoft quickly patched them. February 8, 2024 FortiOS Sees Critical Vulnerability in SSL VPN Functionality Type of vulnerability: Arbitrary code execution by an unauthenticated user.

VPN 104
article thumbnail

Iran-linked MERCURY APT behind destructive attacks on hybrid environments

Security Affairs

Both groups used MULLVAD VPN. The attackers were able to interfere with security tools using Group Policy Objects (GPO). Once bypassed the security defenses, the attackers deployed the ransomware payload in the NETLOGON shares on several domain controllers. DEV-1084 used Rport and a customized version of Ligolo.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why BYOD Is the Favored Ransomware Backdoor

eSecurity Planet

The Sophos X-Ops team highlighted the issue in a recent blog , which details how remote encryption evades multiple layers of network security. Sophos X-Ops illustrates how remote encryption operates beyond security tool detection. Which Unmanaged Devices Do Attackers Use?

article thumbnail

Weekly Vulnerability Recap – September 4, 2023 – Attackers Hit Network Devices and More

eSecurity Planet

Unpatched devices can give attackers privileged access to networks, particularly those set up as VPN virtual servers, ICA proxies, RDP proxies, or AAA servers. It is suspected that the Akira ransomware organization used an undisclosed weakness in Cisco VPN software to evade authentication. MFA should be enabled for all VPN users.

VPN 96
article thumbnail

VulnRecap 3/11/24 – JetBrains & Atlassian Issues Persist

eSecurity Planet

JetBrains released a detailed blog post explaining the specific timeline of discovering the vulnerabilities, the conflict with Rapid7, and JetBrains’ stance on releasing vulnerability information. Whichever user’s privileges the attacker has exploited could then be used to create a remote access VPN session. LTS) 8.5.5 (LTS)

article thumbnail

Patch Tuesday Targets 74 Flaws, Including Microsoft Teams, Office

eSecurity Planet

In a blog post , Ivanti vice president of product management Chris Goettl also highlighted CVE-2023-38180 , a denial of service vulnerability in.NET and Visual Studio that has a lower severity rating but is being actively exploited. The critical Outlook flaw, Barnett added, presents less of a threat. score is 7.5, score is 7.5,

VPN 90
article thumbnail

Improve your AWS security posture, Step 3: Encrypt AWS data in transit and at rest

CyberSecurity Insiders

In the first two blogs in this series, we discussed properly setting up IAM and avoiding direct internet access to AWS resources. In this blog, we’ll tackle encrypting AWS in transit and at rest. Thank you for taking the time to read this blog series. Sometimes, despite all efforts to the contrary, data can be compromised.