🚨 Security Alerts: Critical Vulnerabilities You Need to Know 🚨 1. BeyondTrust Critical Vulnerability (CVE-2024-12356) BeyondTrust has patched a critical unauthenticated command injection vulnerability (CVSS 9.8) in its Privileged Remote Access (PRA) and Remote Support (RS) products. The flaw, discovered during a security incident investigation, allows arbitrary command execution via crafted client requests. Priority: Critical Relevance: General 🔗 More Info on: https://lnkd.in/g736-Hie 2. Multiple Vulnerabilities in Google Chrome for Desktop CERT-In issued a note (CIVN-2024-0356) highlighting several high-severity flaws in Google Chrome for Desktop. These vulnerabilities could enable remote code execution or Denial of Service (DoS) attacks. Priority: Urgent Relevance: General 🔗 More Info on: https://lnkd.in/gX2DYqUg 3. Fortinet Critical Vulnerabilities Limited File Read in FortiWLM (CVE-2023-34990): Allows unauthenticated attackers to read sensitive files via path traversal, risking data exposure. OS Command Injection in FortiManager (CVE-2023-34990): Enables authenticated attackers to execute unauthorized code via FGFM requests. Priority: Critical 🔗 Details on: https://lnkd.in/gvnc-_7f 4. ThreatQuotient ThreatQ Platform Vulnerability In ThreatQuotient ThreatQ Platform versions prior to 5.29.3, a command injection vulnerability exists in the API endpoint, potentially allowing remote code execution. Priority: Critical 🔗 Details on: https://lnkd.in/grPj3B-r Stay updated and secure by applying the latest patches immediately. Cybersecurity is a shared responsibility! 🛡️
Mohamed Amine Gharbi’s Post
More Relevant Posts
-
Ivanti has disclosed a critical authentication bypass vulnerability (CVE-2024-11639) in its Cloud Services Appliance (CSA) versions 5.0.2 and earlier, potentially allowing unauthenticated attackers to gain administrative access. https://lnkd.in/gFqvaChm
Ivanti warns of maximum severity CSA auth bypass vulnerability
bleepingcomputer.com
To view or add a comment, sign in
-
In recent weeks, a concerning trend has emerged: hackers are no longer just targeting large corporations but are setting their sights on cybersecurity solution providers themselves. This shift poses a significant threat, as many organizations—outsource their cybersecurity to third-party providers, making them indirect but highly vulnerable targets. BeyondTrust just disclosed a compromise of its Remote Support SaaS instances due to a hacked API key. This vulnerability, linked to CVE-2024-12356 and CVE-2024-12686, potentially allowed unauthorized access and command execution in systems with Beyond trust installed across multiple organizations. Organizations can no longer just rely on making sure their attack surface is accounted for, they need look into the security postures of their outsourced protection too https://lnkd.in/gtt-PADg
BT24-10 | BeyondTrust
beyondtrust.com
To view or add a comment, sign in
-
Ivanti has released security updates to address multiple critical flaws in its Cloud Services Application (CSA) and Connect Secure products that could lead to privilege escalation and code execution.
Ivanti Issues Critical Security Updates for CSA and Connect Secure Vulnerabilities
thehackernews.com
To view or add a comment, sign in
-
Security Bulletin: CVE-2024-11639 is a critical authentication bypass vulnerability affecting Ivanti's Cloud Services Appliance (CSA) versions 5.0.2 and earlier. The flaw was responsibly disclosed, and there is no evidence of exploitation prior to disclosure. #ThreatIntel #RedLeggSecure #Ivanti https://hubs.li/Q02_sgNC0
Security Bulletin: Ivanti Cloud Services Appliance Authentication Bypass
redlegg.com
To view or add a comment, sign in
-
This is a cool graphic...props team! Cybersecurity is so critical. Make sure you check out the top AI-powered WAF. Available in all major cloud marketplaces. RSVP: https://lnkd.in/eUcz8PYr #cloudsecurity #WAF #cloudsecurity #checkpoint #Azure #AWS #AI
DO NOT Renew your WAF without watching THIS!!
brighttalk.com
To view or add a comment, sign in
-
Three critical vulnerabilities have been discovered in Ivanti's cloud service appliance. Ivanti has patched the appliance and is requiring customers, in addition to updating it to the latest version, to check for any account creation or modification on the appliance. #Ivanti #InfoSec #SecurityOperation #CyberDefense
Zero-Day Alert: Three Critical Ivanti CSA Vulnerabilities Actively Exploited
thehackernews.com
To view or add a comment, sign in
-
Re-onboard LogAnalytics to Sentinel, if SecurityInsights solution is deleted by mistake https://lnkd.in/ggbVWShY #MicrosoftSentinel #Cybersecurity #MicrosoftSecurity #Security #DefenderXDR
https://mortenknudsen.net/?p=3017&utm_source=rss&utm_medium=rss&utm_campaign=re-onboard-loganalytics-to-sentinel-if-securityinsights-solution-is-deleted-by-mistake
https://mortenknudsen.net
To view or add a comment, sign in
-
If your reliance is completely on the cloud then you need to have a comprehensive security wrapper. If your cloud provider is compromised to the point they know “This has included access to some of the company’s source code repositories and internal systems” there’s a big, big problem and you need to consider your exposure. If your IT director/manager/person is telling you that “everything is in Azure”, you’ve got all your eggs in a basket which has very concerning holes.
Update on Microsoft Actions Following Attack by Nation State Actor Midnight Blizzard
msrc.microsoft.com
To view or add a comment, sign in
-
Yes proactive threats prevention in cyber security is a better approach than toothless threats detection. Take a look at how the Check Point CloudGuard platform is changing #cloudsecurity
How Preventative Cloud Security Actually Works
https://www.youtube.com/
To view or add a comment, sign in
-
The security bugs were found susceptible to exploitation in connection to the previously disclosed, critical CVE-2024-8963 vulnerability in the security vendor's Cloud Services Appliance (CSA). #vulnerability #exploit #infosec #devsecops
3 More Ivanti Cloud Vulns Exploited in the Wild
darkreading.com
To view or add a comment, sign in