article thumbnail

VulnRecap 2/19/2024: News from Microsoft, Zoom, SolarWinds

eSecurity Planet

Among the vulnerabilities is CVE-2024-21412 , an Internet Shortcut Files flaw that allows an unauthenticated attacker to send a malicious file to a user. It bypasses Internet Shortcut Files’ security measures. The vulnerability, CVE-2020-3259 , was first discovered in May 2020. Enabling logging.

VPN 98
article thumbnail

Weekly Vulnerability Recap – September 4, 2023 – Attackers Hit Network Devices and More

eSecurity Planet

Unpatched devices can give attackers privileged access to networks, particularly those set up as VPN virtual servers, ICA proxies, RDP proxies, or AAA servers. This major security weakness can allow unauthenticated attackers to execute code on vulnerable devices through the Internet-exposed J-Web configuration interface.

VPN 96
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Vulnerability Recap 4/15/24 – Palo Alto, Microsoft, Ivanti Exploits

eSecurity Planet

Threats range from severe weaknesses in Ivanti’s VPN appliances to zero-day exploits in popular software such as Palo Alto Networks’ PAN-OS and Telegram’s Windows client. Typically, these vulnerabilities result in remote code execution or denial-of-service attacks, posing major dangers to users’ data security.

article thumbnail

Why BYOD Is the Favored Ransomware Backdoor

eSecurity Planet

This category also includes routers, switches, and Internet of Things (IoT) devices that can’t install traditional endpoint protection such as antivirus (AV) or endpoint detection and response (EDR) solutions. NGFWs can decrypt and inspect VPN traffic to monitor file exfiltration as well as detect increased and anomalous traffic.

article thumbnail

Improve your AWS security posture, Step 3: Encrypt AWS data in transit and at rest

CyberSecurity Insiders

In the first two blogs in this series, we discussed properly setting up IAM and avoiding direct internet access to AWS resources. Note : an exception to this statement is if the generation of encryption keys occurs over a publicly available Internet connection (e.g., coffee shop WiFi). ” What Is AWS Certificate Manager?

article thumbnail

VulnRecap 1/22/24 – Watch Chrome, Ivanti, Citrix Issues

eSecurity Planet

To exploit CVE-2023-6549, an attacker must find an appliance that’s configured as a gateway, such as a VPN virtual server, or it must be configured as an AAA virtual server. NDcPP Citrix also suggests that users don’t expose the Netscaler ADC management interface to the internet. and later releases of 13.1 NetScaler ADC 13.1-FIPS

article thumbnail

Volt Typhoon Disrupts US Organizations, CISA Issues Alerts

eSecurity Planet

government and defense institutions for intelligence gathering. Using web shells, they attacked weak internet servers, specifically a Houston port. In November 2021, the FBI disclosed a FatPipe VPN exploit that enabled backdoor access via web shells. Want to strengthen your organization’s digital defenses?

Internet 104