Tag “Fortinet”

Fortinet and Zoho Encourage Customers to Address Enterprise Software Vulnerabilities with Patching

Fortinet has identified a critical vulnerability impacting its FortiADC application delivery controller that has the potential for arbitrary code execution. This flaw, categorized as CVE-2022-39947 with a CVSS score of 8.6, affects several FortiADC versions, including 7.0.0 to 7.0.2, 6.2.0 to 6.2.3, and several earlier versions down to 5.4.0. According…

Read MoreFortinet and Zoho Encourage Customers to Address Enterprise Software Vulnerabilities with Patching

Zero-Day Exploit of FortiOS Vulnerability Targeting Government and Organizations

Exploitation of FortiOS SSL-VPN Zero-Day Vulnerability Targets Government Entities A critical zero-day vulnerability in FortiOS SSL-VPN was exploited by unknown threat actors in recent attacks, targeting governmental and other large organizations, as reported by Fortinet. This vulnerability, identified as CVE-2022-42475, is a heap-based buffer overflow flaw that permits unauthenticated remote…

Read MoreZero-Day Exploit of FortiOS Vulnerability Targeting Government and Organizations

Chinese Hackers Exploit Recent Fortinet Vulnerability as 0-Day for Malware Deployment

Recent cybersecurity intelligence has revealed a sophisticated exploitation of a patched vulnerability in Fortinet’s FortiOS SSL-VPN. This zero-day exploit is believed to have been leveraged by a suspected state-sponsored threat actor associated with China, targeting a government entity in Europe and a managed service provider (MSP) in Africa. Evidence gathered…

Read MoreChinese Hackers Exploit Recent Fortinet Vulnerability as 0-Day for Malware Deployment

DUHK Attack Enables Hackers to Retrieve Encryption Keys for VPNs and Web Sessions

New Cryptographic Vulnerability: DUHK A recent cryptographic vulnerability known as DUHK, which stands for “Don’t Use Hard-coded Keys,” has emerged as a significant concern for VPN and web browsing security. This non-trivial flaw could enable attackers to extract encryption keys, potentially compromising sensitive data. The DUHK vulnerability follows closely on…

Read MoreDUHK Attack Enables Hackers to Retrieve Encryption Keys for VPNs and Web Sessions

Critical Vulnerability in FortiOS and FortiProxy May Allow Hackers Remote Access

Fortinet Issues Critical Security Patches Addressing Major Vulnerabilities Fortinet has announced the release of patches to rectify 15 significant security vulnerabilities, including one labeled as critical, affecting both FortiOS and FortiProxy. This particular vulnerability, identified as CVE-2023-25610, has been rated with a severity score of 9.3 out of 10, indicating…

Read MoreCritical Vulnerability in FortiOS and FortiProxy May Allow Hackers Remote Access

Fortinet FortiOS Vulnerability Targeted in Attacks on Government Entities

A new cyber incident has emerged involving an unknown threat actor exploiting a vulnerability in Fortinet’s FortiOS software. The attack has resulted in significant data loss and corruption of operating systems and files, primarily targeting government entities and large organizations. Fortinet researchers Guillaume Lovet and Alex Kong, in an advisory…

Read MoreFortinet FortiOS Vulnerability Targeted in Attacks on Government Entities

Microsoft Releases Patches for 80 Vulnerabilities, Including Two Currently Under Attack

In its March 2023 Patch Tuesday update, Microsoft disclosed fixes for 80 security vulnerabilities, two of which have been actively exploited in the wild. These vulnerabilities target critical components within the Microsoft ecosystem, with eight categorized as Critical, 71 as Important, and one as Moderate in severity. This update continues…

Read MoreMicrosoft Releases Patches for 80 Vulnerabilities, Including Two Currently Under Attack

Hackers Take Advantage of Newly Revealed Microsoft Office Vulnerability to Install Backdoors on PCs

Severe Microsoft Office Vulnerability Exploited to Deliver Cobalt Malware Recently uncovered, a critical 17-year-old vulnerability in Microsoft Office is being actively exploited by threat actors to deploy backdoor malware. This vulnerability, designated as CVE-2017-11882, allows hackers to install malicious software on targeted systems without requiring any user interaction, raising significant…

Read MoreHackers Take Advantage of Newly Revealed Microsoft Office Vulnerability to Install Backdoors on PCs

CISA Warns of OT Vulnerabilities Following Polish Power Grid Cyberattack

Cybersecurity Incident Roundup: Key Developments in Data Breaches and Cyber-attacks Recent weeks have seen significant cybersecurity incidents impacting various sectors, with agencies and organizations navigating the evolving landscape of cyber threats. Among the most pressing events, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued warnings following a cyberattack…

Read MoreCISA Warns of OT Vulnerabilities Following Polish Power Grid Cyberattack