Category: CyberSecurity

  • FortiSIEM’s Critical OS Command Injection Vulnerabilities: CVE-2024-23108 and CVE-2024-23109

    Fortinet has recently issued a warning about two critical-severity vulnerabilities within its FortiSIEM platform. These vulnerabilities, identified as CVE-2024-23108 and CVE-2024-23109, both received the highest level of concern with a provisional Common Vulnerability Scoring System (CVSS) score of 10. These vulnerabilities have a high potential to be exploited without any form of authentication, a prospect…

  • Clorox’s August 2023 Cyberattack: A $49 Million Update

    In a recent SEC filing, Clorox, the American manufacturing giant known for its consumer and professional cleaning products, has disclosed the financial aftermath of a cyberattack that struck the company in August 2023. This cyber incident, which commenced on August 11, led to the company identifying unauthorized activities within its systems, prompting immediate action to…

  • Overview: Phish Tale of the Week Often times phishing campaigns, created by malicious actors, target users by utilizing social engineering. For example, in this text message, the actors are appearing as Netflix and informing you that action needs to be taken regarding your payment method on your account. The message politely explains that our account…

  • Netizen: January 2024 Vulnerability Review

    Netizen’s Security Operations Center (SOC) has identified and detailed five critical vulnerabilities from January that should be promptly patched. These include issues in NetScaler ADC, NetScaler Gateway, Google Chrome, vCenter Server, and Apache ActiveMQ. Netizen offers advanced security solutions and services, including compliance support, vulnerability assessments, and an automated assessment tool.

  • The FTC’s Crackdown on Location Data Misuse: InMarket’s Landmark Settlement

    The Federal Trade Commission’s (FTC) January 18th enforcement actions signal a significant shift in the regulatory landscape concerning consumer privacy and data protection. One of the most striking instances of this change is the proposed settlement with InMarket Media, a Texas-based data aggregator. This case is noteworthy not only for its direct implications for InMarket…

  • OpenAI: New Ventures in Military Collaboration

    In a significant shift, OpenAI, the creator of ChatGPT, has announced collaboration with the Pentagon on various software projects, including those related to cybersecurity. This announcement marks a substantial departure from the organization’s prior stance, as it had previously imposed a ban on employing its artificial intelligence technology for military purposes. Military Engagement and Ethical…

  • Thread-Hijacking: The Escalating Threat of Pikabot Malware

    The emergence of Pikabot malware, employed by the group Water Curupira, represents a significant shift in cyber threat tactics, with its deployment closely linked to sophisticated phishing strategies like email conversation thread hijacking. Pikabot and Its Operational Tactics Pikabot operates as a loader malware with two components: a loader and a core module. This sophisticated…

  • SMTP Smuggling: The New Technique Threatening Email Security by Exploiting Protocol Discrepancies

    SMTP smuggling, a novel cybersecurity threat, has emerged as a significant concern due to its ability to exploit vulnerabilities in the Simple Mail Transfer Protocol (SMTP). This protocol is widely used by mail servers for the transmission, reception, and relaying of emails. Discovered by Timo Longin from SEC Consult, SMTP smuggling allows malicious actors to…

  • Netizen: December 2023 Vulnerability Review

    Security vulnerabilities are a constant threat to business operations, making prompt patching crucial. Netizen’s Security Operations Center highlights five critical vulnerabilities from December, emphasizing the need for immediate action. These include issues with Microsoft Power Platform Connector, Google Chrome’s WebRTC framework, Apache Struts, SSH ProxyCommand, and Apache OFBiz. Netizen offers comprehensive security solutions and support.

  • Overview: Phish Tale of the Week Often times phishing campaigns, created by malicious actors, target users by utilizing social engineering. For example, in this text message, the actors are appearing as LinkedIn, the social media platform, and informing you that action needs to be taken regarding your account. The message politely explains that someone else…