Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CVE-2024-0204: Critical Authentication Bypass in Fortra's GoAnywhere MFT

On January 22, 2024, Fortra publicly disclosed a critical vulnerability, CVE-2024-0204, in their GoAnywhere MFT product. This vulnerability, which was responsibly disclosed to Fortra by Spark Engineering Consultants, had been patched on December 7, 2023. CVE-2024-0204 is a severe authentication bypass vulnerability with a CVSS score of 9.8.

Introducing Advanced Analytics Dashboard for Analyzing Corporate Devices

We are witnessing an explosion in the number, type, and mix of smart devices in our business environment, driven by mobility, remote work, and the adoption of digital transformation initiatives. However, these devices come with their own set of security risks and challenges, creating a larger attack surface to manage and control.

Ransomware's PLAYing a Broken Game

The Play ransomware group is one of the most successful ransomware syndicates today. All it takes is a quick peek with a disassembler to know why this group has become infamous. This is because reverse engineering the malware would be a Sisyphean task full of anti-analysis techniques. That said, it might come as a surprise that the malware crashes quite frequently when running.

Server-Side Template Injection Vulnerability in Confluence Data Center and Server (CVE-2023-22527)

On January 16 2024, Atlassian issued a significant alert on a critical Server-Side Template Injection (SSTI) vulnerability in Confluence Data Center and Server, identified as CVE-2023-22527. This issue found in older versions, poses a serious risk as it allows attackers without any authentication, to inject OGNL expressions. This means they could potentially run any code they want on the compromised system.

HISCOX Cyber Readiness Report Shines Light on Commercial Cybersecurity

One of the most important concerns for organizations of all sizes is protection against cyberattacks and other digital threats to security. These dangers can prove a major setback for a company, and many even pose an existential threat. In order to effectively prevent cybersecurity incidents and protect sensitive data and other vital assets, organizations must be prepared for the possibility of an attack.

What is Cybersecurity Risk Management?

In the constantly evolving world of digital technology, cybersecurity risk management is a critical pillar in any organization. By effectively managing cybersecurity risk, you reduce incidents and the costs resulting from data breaches. However, cybersecurity risk management involves many different elements. It’s helpful to have an understanding of these aspects in order to leverage cybersecurity risk management to its fullest potential.

6 Essentials for a Near Perfect Cyber Threat Intelligence Framework

Software developers face a constant barrage of cyber threats that can compromise their applications, data, and the security of their organizations. In 2023, the cyber threat intelligence (CTI) market is worth approximately $11.6 billion, and it’s projected to surpass $21 billion by 2027. Why?

NIST SP 800-162 Attribute Based Access Control (ABAC) Guide

NIST SP 800-162 ‘Guide to Attribute Based Access Control (ABAC) Definition and Considerations’ is a special publication that defines attribute-based access control (ABAC) for U.S. government agencies. It also provides guidance on using ABAC to improve and maintain control of information sharing within and between organizations and best practices for ABAC implementations.