Fortinet Warns of Critical Vulnerability in FortiManager: Stay Protected from Active Exploitation

Fortinet Warns of Critical Vulnerability in FortiManager: Stay Protected from Active Exploitation

Critical Vulnerability in FortiManager: What You Need to Know Fortinet has confirmed a critical security flaw in FortiManager, which is actively being exploited in the wild. This vulnerability, tracked as CVE-2024-47575, has a CVSS score of 9.8, indicating its severity. Also known as FortiJump, this flaw is rooted in the FortiGate to FortiManager (FGFM) protocol…

Read More
New Grandoreiro Banking Malware Variants: Advanced Tactics for Evading Detection

New Grandoreiro Banking Malware Variants: Advanced Tactics for Evading Detection

The Evolution of Grandoreiro Banking Malware New variants of banking malware known as Grandoreiro have been discovered that utilize innovative tactics to bypass anti-fraud measures. This development suggests that the malicious software continues to evolve, despite ongoing law enforcement efforts aimed at dismantling its operation. The remaining operators behind Grandoreiro are still targeting users globally,…

Read More
CISA Warning: Microsoft SharePoint Vulnerability (CVE-2024-38094) Exploitation Alert

CISA Warning: Microsoft SharePoint Vulnerability (CVE-2024-38094) Exploitation Alert

Understanding CVE-2024-38094: A Critical Vulnerability in Microsoft SharePoint The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has identified a significant vulnerability in Microsoft SharePoint. This vulnerability, tracked as CVE-2024-38094, is categorized as a high-severity flaw that poses serious risks. As threats evolve, it's vital for organizations using SharePoint to understand the implications and take necessary…

Read More
Permiso State of Identity Security 2024: A Shake-up in Identity Security Is Looming Large

Permiso State of Identity Security 2024: A Shake-up in Identity Security Is Looming Large

Rethinking Identity Security in a Post-Breach World Identity security is front and center, especially after recent security breaches affecting high-profile organizations like Microsoft, Okta, Cloudflare, and Snowflake. As these incidents demonstrate, identity security is not just a technical issue but a strategic necessity. Organizations are starting to recognize that a fresh approach to identity security…

Read More
Gophish Framework: Deploying Remote Access Trojans in Phishing Campaigns

Gophish Framework: Deploying Remote Access Trojans in Phishing Campaigns

Phishing Campaign Targeting Russian-Speaking Users Russian-speaking users are currently facing a new phishing campaign that exploits the Gophish open-source phishing toolkit. This campaign aims to deliver two types of remote access trojans (RATs): DarkCrystal RAT (also known as DCRat) and a previously undocumented Trojan called PowerRAT. Understanding the mechanics of these attacks is crucial for…

Read More
How Cybercriminals Are Exploiting Docker API Servers for SRBMiner Crypto Mining Attacks

How Cybercriminals Are Exploiting Docker API Servers for SRBMiner Crypto Mining Attacks

Docker Remote API Vulnerabilities: Understanding the Threat Recent investigations reveal that bad actors have been targeting Docker remote API servers to deploy SRBMiner, a type of cryptocurrency miner, on compromised instances. According to findings from Trend Micro, these attacks illustrate how hackers exploit weaknesses in the Docker environment. Researchers Abdelrahman Esmail and Sunil Bharti highlighted…

Read More
How to Protect Your NTLM Hashes from Remote Attackers: Understanding the Security Flaw in Styra's OPA

How to Protect Your NTLM Hashes from Remote Attackers: Understanding the Security Flaw in Styra’s OPA

Understanding the Security Flaw in Styra's Open Policy Agent Recently, details have emerged about a now-patched security flaw in Styra's Open Policy Agent (OPA). This vulnerability could have allowed attackers to leak New Technology LAN Manager (NTLM) hashes from the OPA server. If successfully exploited, this flaw could provide unauthorized access to sensitive information, leading…

Read More
Ultimate Guide to Uncovering Service Accounts in Active Directory

Ultimate Guide to Uncovering Service Accounts in Active Directory

Understanding the Importance of Service Accounts in Active Directory Service accounts play a crucial role in enterprise environments. They help automate processes like managing applications or running scripts. However, these accounts come with elevated privileges, which can create significant security risks if not monitored correctly. In this guide, we’ll highlight how to locate and secure…

Read More