Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Threat Intelligence

Fortinet Vulnerability: CVE-2024-21762

On Thursday, February 8th, the Fortinet Product Security Incident Response Team released an advisory (FG-IR-24-015) notifying of an out-of-bound write vulnerability in their SSL VPN tracked as CVE-2024-21762. The vulnerability “may allow a remote unauthenticated attacker to execute arbitrary code or command via specially crafted HTTP requests”.

Security Bulletin: AnyDesk Production Systems Breach

On February 2nd, 2024, AnyDesk disclosed that their production systems had been compromised and that private code signing keys and source code were stolen, while an unknown number of user accounts had their passwords reset. This is a significant concern, as it would allow a malicious attacker to generate malicious versions of AnyDesk software with compromised code that appears to be legitimate. It is assessed that approximately 18,000 credentials are available for sale on the Dark Web as a result.

6 Essentials for a Near Perfect Cyber Threat Intelligence Framework

Software developers face a constant barrage of cyber threats that can compromise their applications, data, and the security of their organizations. In 2023, the cyber threat intelligence (CTI) market is worth approximately $11.6 billion, and it’s projected to surpass $21 billion by 2027. Why?

5 tips to get the most out of your threat intelligence platform

Threat intelligence management is an essential component of any modern cybersecurity strategy. With cyber attacks becoming more sophisticated and frequent, it’s more important than ever to have the right tools and tactics in place to identify and prevent threats. A threat intelligence platform (TIP) can be a powerful tool in this fight, providing real-time insights and actionable intelligence to help organizations stay ahead of the game.
Featured Post

Breaking the cybersecurity automation logjam won't break the bank

Right now, to boost efficiency and achieve economies of scale, businesses want to automate as much as possible. In back office processes, approaches like Robotic Process Automation (RPA), for example, are now increasingly standard and are expected to be a $20bn-plus market by 2030. In parallel, enterprises are looking to ChatGPT and Generative AI to help them speed up everything from creating marketing brochures to drug discovery.

2024 Cyber Threat Projections - What Lies Ahead

Brace for impact—CISOs and IT professionals are gearing up for what promises to be an intense year in cybersecurity. Cybercriminals are readying themselves with increasingly cunning tactics against unsuspecting organizations and users. From leveraging artificial intelligence in creating bespoke malware to launching impressively uncanny spoofed sites, the risks are becoming increasingly intricate and difficult to predict.

In 2024, we'll see escalating threats from the software supply chain

Today’s modern supply chains can be large and complex, involving many suppliers doing many different things. As digital transformation initiatives have accelerated, the ecosystem of suppliers has exploded. Effectively securing the supply chain is hard because vulnerabilities can be inherent, or introduced and exploited, at any point in the supply chain. Unfortunately, a compromised software supply chain can cause significant damage and disruption.