Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

4 Tips to Improve Cybersecurity for Your Business

Businesses of all sizes must be concerned about cybersecurity in today's interconnected world. Trust and survival depend on your company's ability to keep private information secret, protect consumer data, and repel cyberattacks. To better protect your company online, we've compiled five tried-and-true strategies.

KeePass CVE-2023-32784: Detection of Processes Memory Dump

During May, a new vulnerability CVE-2023-32784 was discovered that affected KeePass. KeePass is a popular open source password manager which runs on Windows, Mac, or Linux. The vulnerability allows the extraction of the master key in cleartext from the memory of the process that was running. The master key will allow an attacker to access all the stored credentials. We strongly recommend updating to KeePass 2.54 to fix the vulnerability.

CVE-2023-27997: Critical Fortinet Fortigate SSL-VPN RCE Vulnerability

On June 9th 2023, security researchers from Olympe CyberDefense published a blog stating that they responsibly disclosed a critical vulnerability in SSL-VPN firewalls to Fortinet. This vulnerability, CVE-2023-27997, is a critical, pre-authentication RCE vulnerability that impacts all versions of Fortinet SSL-VPN firewalls, even if multi-factor authentication (MFA) is enabled. The security researchers responsibly disclosed the vulnerability to Fortinet.

Snyk named a Leader, placed highest in Strategy category in The Forrester Wave: Software Composition Analysis (SCA), Q2 2023 report

We’re thrilled to announce that Snyk was named a Leader in The Forrester Wave™: Software Composition Analysis (SCA), Q2 2023 report! We believe this recognition — and the fact that we are ranked highest in the Strategy category out of all evaluated vendors — highlights the work we’ve done at Snyk to disrupt the industry with developer-centric application security solutions to help companies secure their software supply chain.

Mass Exploitation of MOVEit Transfer Critical Vulnerability - Recommended Mitigations and How Forescout Can Help

On May 31, Forescout Research – Vedere Labs uncovered a significant incident where threat actors exploited a critical zero-day vulnerability in the MOVEit Transfer software, which resulted in unauthorized access to and exfiltration of private data, as well as privilege escalation. MOVEit Transfer is a widely adopted managed file transfer (MFT) solution that enables organizations to securely exchange files with their business partners and customers.

Shielding Against the Most Recent Fortinet Vulnerability

During a red team assessment for a client, Charles Fol and Dany Bach from LEXFO, discovered a heap overflow bug in Fortigate’s SSL VPN that can be exploited to achieve remote code execution on Fortigate instances. This vulnerability is reachable without authentication, and can be used to execute arbitrary code on vulnerable systems, which could lead to a complete compromise of the system.

Benefits of Using a Penetration Testing Dashboard For Your Security Testing Needs

In today's digital landscape, cybersecurity is a top priority for international businesses. Ensuring the integrity of network and data protection requires vigilance and proactive measures-enter penetration testing dashboards. These state-of-the-art resources streamline security testing by centralizing processes, identifying vulnerabilities, and safeguarding vital information assets. Discover the benefits of using a penetration testing dashboard for your security testing needs as we examine core features, advantages, and why it's essential in your cybersecurity arsenal.

Spear Phishing Attacks: Understanding and Mitigating the Risk

In an increasingly interconnected world, cybersecurity has never been more important. One of the most prevalent and potent threats to individual and organizational security is spear phishing. Unlike phishing, which casts a wide net in hopes of catching any unsuspecting victim, spear phishing is a more targeted approach. The attacker customizes their emails, texts, or other messages to mimic trustworthy sources and deceive specific individuals into revealing sensitive information.