Latest Cybersecurity News and Articles


Exploitation of vulnerability affecting Fortinet FortiManager

24 October 2024
The NCSC is encouraging UK organisations to take immediate action to mitigate a vulnerability affecting Fortinet FortiManager (CVE-2024-47575) and to follow the latest vendor advice.

Fortinet Warns of Critical Vulnerability in FortiManager Under Active Exploitation

24 October 2024
Fortinet has confirmed details of a critical security flaw impacting FortiManager that has come under active exploitation in the wild. Tracked as CVE-2024-47575 (CVSS score: 9.8), the vulnerability is also known as FortiJump and is rooted in the FortiGate to FortiManager (FGFM) protocol. "A missing authentication for critical function vulnerability [CWE-306] in FortiManager fgfmd daemon may

New macOS vulnerability allows unauthorized data access

24 October 2024
A new macOS vulnerability could allow a malicious actor to evade an operating system’s Transparency, Consent, and Control (TCC) technology. 

New Grandoreiro Banking Malware Variants Emerge with Advanced Tactics to Evade Detection

23 October 2024
New variants of a banking malware called Grandoreiro have been found to adopt new tactics in an effort to bypass anti-fraud measures, indicating that the malicious software is continuing to be actively developed despite law enforcement efforts to crack down on the operation. "Only part of this gang was arrested: the remaining operators behind Grandoreiro continue attacking users all over the

4 organizations charged with misleading cyber disclosures

23 October 2024
The SEC has charged four public companies with misleading disclosures about cyber risks and intrusions.

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

23 October 2024
In episode 25 of the Cybersecurity & Geopolitical Discussion, our trio of hosts pull apart the rapidly deteriorating situation in the Middle East.

Permiso State of Identity Security 2024: A Shake-up in Identity Security Is Looming Large

23 October 2024
Identity security is front, and center given all the recent breaches that include Microsoft, Okta, Cloudflare and Snowflake to name a few. Organizations are starting to realize that a shake-up is needed in terms of the way we approach identity security both from a strategic but also a technology vantage point.  Identity security is more than just provisioning access  The conventional view

CISA Warns of Active Exploitation of Microsoft SharePoint Vulnerability (CVE-2024-38094)

23 October 2024
A high-severity flaw impacting Microsoft SharePoint has been added to the Known Exploited Vulnerabilities (KEV) catalog by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday, citing evidence of active exploitation. The vulnerability, tracked as CVE-2024-38094 (CVSS score: 7.2), has been described as a deserialization vulnerability impacting SharePoint that could result

CISOs respond: 49% of CISOs plan to leave role without industry action

23 October 2024
A survey shows that nearly half (49%) of CISOs do not believe there is a future for them in this role. CISOs are sharing their insights on this statistic. 

The Global Surveillance Free-for-All in Mobile Ad Data

23 October 2024
Not long ago, the ability to remotely track someone’s daily movements just by knowing their home address, employer, or place of worship was considered a powerful surveillance tool that should only be in the purview of nation states. But a new lawsuit in a likely constitutional battle over a New Jersey privacy law shows that anyone can now access this capability, thanks to a proliferation of commercial services that hoover up the digital exhaust emitted by widely-used mobile apps and websites.

Researchers Reveal 'Deceptive Delight' Method to Jailbreak AI Models

23 October 2024
Cybersecurity researchers have shed light on a new adversarial technique that could be used to jailbreak large language models (LLMs) during the course of an interactive conversation by sneaking in an undesirable instruction between benign ones. The approach has been codenamed Deceptive Delight by Palo Alto Networks Unit 42, which described it as both simple and effective, achieving an average

Think You’re Secure? 49% of Enterprises Underestimate SaaS Risks

23 October 2024
It may come as a surprise to learn that 34% of security practitioners are in the dark about how many SaaS applications are deployed in their organizations. And it’s no wonder—the recent AppOmni 2024 State of SaaS Security Report reveals that only 15% of organizations centralize SaaS security within their cybersecurity teams. These statistics not only highlight a critical security blind spot,

Ransomware Gangs Use LockBit's Fame to Intimidate Victims in Latest Attacks

23 October 2024
Threat actors have been observed abusing Amazon S3 (Simple Storage Service) Transfer Acceleration feature as part of ransomware attacks designed to exfiltrate victim data and upload them to S3 buckets under their control. "Attempts were made to disguise the Golang ransomware as the notorious LockBit ransomware," Trend Micro researchers Jaromir Horejsi and Nitesh Surana said. "However, such is

Gophish Framework Used in Phishing Campaigns to Deploy Remote Access Trojans

22 October 2024
Russian-speaking users have become the target of a new phishing campaign that leverages an open-source phishing toolkit called Gophish to deliver DarkCrystal RAT (aka DCRat) and a previously undocumented remote access trojan dubbed PowerRAT. "The campaign involves modular infection chains that are either Maldoc or HTML-based infections and require the victim's intervention to trigger the

Iranian cyber actors are targeting critical infrastructure entities

22 October 2024
Iranian cyber actors are targeting critical infrastructure entities via brute force.

Security Flaw in Styra's OPA Exposes NTLM Hashes to Remote Attackers

22 October 2024
Details have emerged about a now-patched security flaw in Styra's Open Policy Agent (OPA) that, if successfully exploited, could have led to leakage of New Technology LAN Manager (NTLM) hashes. "The vulnerability could have allowed an attacker to leak the NTLM credentials of the OPA server's local user account to a remote server, potentially allowing the attacker to relay the authentication or

Cybercriminals Exploiting Docker API Servers for SRBMiner Crypto Mining Attacks

22 October 2024
Bad actors have been observed targeting Docker remote API servers to deploy the SRBMiner crypto miner on compromised instances, according to new findings from Trend Micro. "In this attack, the threat actor used the gRPC protocol over h2c to evade security solutions and execute their crypto mining operations on the Docker host," researchers Abdelrahman Esmail and Sunil Bharti said in a technical

34% of CIOs ranked securing the network as their number one priority

22 October 2024
According to a recent report, 34% of chief information officers (CIOs) ranked securing the network as their number one priority. 

Research uncovers new attack method, security leaders share insights

22 October 2024
Researchers at the University of Texas at Austin discovered a new attack method. 

A Comprehensive Guide to Finding Service Accounts in Active Directory

22 October 2024
Service accounts are vital in any enterprise, running automated processes like managing applications or scripts. However, without proper monitoring, they can pose a significant security risk due to their elevated privileges. This guide will walk you through how to locate and secure these accounts within Active Directory (AD), and explore how Silverfort’s solutions can help enhance your