Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CVE-2024-20353 and CVE-2024-20359: Cisco ASA and FTD Vulnerabilities Exploited by State-Sponsored Threat Actor in Espionage Campaign "ArcaneDoor"

On April 24, 2024, Cisco Talos and several government security agencies published details on a sophisticated threat campaign focused on espionage and gaining unauthorized access to sensitive information from targeted government entities and organizations in critical infrastructure. As part of that publication, Cisco disclosed CVE-2024-20353 and CVE-2024-20359, affecting Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) devices, which were actively exploited in the documented campaign.

When and How to Use Trivy to Scan Containers for Vulnerabilities

Containers are integral to modern application development portability, resource efficiency, and ease of deployment. But there is a flip side to these benefits. Unlike traditional applications, containers bundle everything needed to run, making them a scattered setup for hidden security issues. 54% of container images in Docker Hub were found to contain sensitive information that could lead to unauthorized access, data breaches, or identity theft.

How to Recognize and Avoid Publishers Clearing House Scams

The Publishers Clearing House (PCH) appeared in 1967, promoting magazine subscriptions, merchandise, time-share vacations, and their famous cash prize sweepstakes. Since 67’ over 11 million people have won PCH sweepstakes, totaling over $593 million in cash winnings. More people than ever have entered the PCH sweepstakes, looking for their chance to win thousands - sometimes millions - of dollars overnight.

Protecting Zion: InfoSec Encryption Concepts and Tips

This is Part 9 in my ongoing project to cover 30 cybersecurity topics in 30 weekly blog posts. The full series can be found here. In the movie The Matrix, The Key Maker controlled access to many locations and resources with the goal of preventing malicious code from destroying sensitive information. In a rare life-imitates-art situation, organizations today face the same challenge as they work to protect operational processes and corporate information.

CrowdStrike Named a Leader in IDC MarketScape for Worldwide MDR

The #1 global managed detection and response (MDR) provider and pioneer continues to dominate. Today, CrowdStrike was named a Leader in the 2024 IDC MarketScape: Worldwide Managed Detection and Response 2024 Vendor Assessment1 among the 19 vendors evaluated in the report. CrowdStrike was also recently named a Leader in Frost & Sullivan’s 2024 Frost Radar: Managed Detection and Response. The global demand for MDR continues to surge as businesses face a harsh reality.

NIS 2 Directive: Strengthening IoT Security in the EU

In today’s interconnected world, the Internet of Things (IoT) plays a crucial role in various sectors, from healthcare and transportation to energy and critical infrastructure. However, with the increasing reliance on IoT devices comes the heightened risk of cybersecurity threats. To address these challenges and enhance cybersecurity measures across the European Union (EU), the NIS 2 Directive (Directive (EU) 2022/2555) was introduced.

Immutable Backups: Importance, Benefits, and Implementation

Ransomware, human errors, and disasters are constant threats to your business’s most valuable asset –its data. Traditional backups, while essential, aren’t always enough since ransomware can still infiltrate them. That’s where immutable backups emerge as a crucial layer of protection. They ensure that even if the worst happens, your critical information remains untouched and recoverable.

Enhancing Cybersecurity with BlueVoyant's AI Technology for Emerging Vulnerabilities

After a new zero-day vulnerability is announced, the National Vulnerability Database (NVD) publishes a measure of its severity under the Common Vulnerability Scoring System (CVSS). CVSS scores are a crucial tool for organizations as they give an approximation of the severity of disclosed vulnerabilities.

Cisco Duo Third-Party Compromise

On April 16, 2024, Cisco Duo informed affected customers of a breach involving their SMS and VOIP multi-factor authentication (MFA) service provider. The breach occurred on April 1st due to a phishing attack, allowing unauthorized access to the provider’s systems, including SMS and VoIP MFA message logs for specific Duo accounts between March 1st and March 31st, 2024. Though the threat actor accessed message logs, they did not obtain message content.

Critical Authentication Bypass Vulnerability in Delinea Secret Server Disclosed Along With PoC

On April 12, 2024, Delinea issued an advisory to address a critical authentication bypass vulnerability identified in the SOAP API component of its Secret Server product, available in both Cloud and On-Premises solutions. A threat actor could exploit this vulnerability to bypass authentication, gain administrative access, and extract sensitive information.