Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

CVE-2024-6387 OpenSSH RCE vulnerability ("regreSSHion") - Cato Networks impact and analysis

TL; DR – Multiple versions of OpenSSH are vulnerable to remote code execution. There is no working public PoC, and researchers have only been able to exploit the vulnerability under unique lab conditions. Cato Sockets by default do NOT have a publicly exposed SSH interface, it is always recommended to keep Cato Sockets LAN interface exposed only internally and use comprehensive network access controls to manage SSH access.

The 6 Best Secure Cloud Storage Services in 2024

Data breaches, leaks, hacks, and compromised passwords pose a real threat to our data. If you don’t take action to protect your sensitive data, you are leaving your information exposed to hackers who could: Although many data breaches occur due to factors outside your control, it’s still important to protect your data to avoid it falling into the wrong hands. The best way to do this is by choosing from the numerous secure cloud storage services in 2024.

Do not allow anonymous enumeration of SAM accounts

The two policy settings in the CIS Benchmarks control the ability of anonymous users to enumerate the accounts in the Security Accounts Manager (SAM). By enabling the policy settings, users with anonymous connections will not be able to enumerate domain account user names on the systems in your environment.