Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Networks

Cloud security study reveals: over 50% of system failures are caused by human error and mismanagement

The past few years have witnessed a rapid surge in the use of SaaS applications across various industries. But with this growth comes a significant challenge: managing security and assessing risk in application connectivity.

Lessons Learned from OT:ICEFALL - New Vulnerabilities and Insights on OT Security Design and Patching

In our final OT:ICEFALL report, Forescout Vedere Labs presents three new vulnerabilities and concludes the project after one year of research following the original disclosure. The OT:ICEFALL research, including 61 vulnerabilities affecting 13 vendors, has yielded three key insights into the current state of OT product security.

5 Best Practices to Achieve a Trusted Wireless Environment

Complexity is the new normal, which applies equally to businesses’ networks and wireless environments. This is complicated further by the fact that cyberattacks that seek to exploit vulnerabilities in organizations' WLANs (Wireless Local Area Networks) are becoming increasingly sophisticated. On World Wi-Fi Day, we want to offer you security tips to create a safer wireless environment.

What is NFV

In today's fast-paced digital landscape, businesses proactively seek innovative ways to optimize their networks, enhance operational efficiency, and reduce costs. Network Functions Virtualization (NFV) emerges as a transformative technology that leads the charge. NFV revolutionizes traditional, hardware-based network functions by converting them into flexible, software-based solutions.

Today's Networks are Complex and Complicated, but do they have to be?

Networks today are different from what they were ten years ago, and one could argue that depending on the organization you work for, these networks are different from those just a few years ago. The rise of hybrid networks has made troubleshooting these networks that much more complex. Before, it could have been a hub and spoke design from your end users to the resources they need to access in one of the data centers.

How Do You Know If You're Covered for TTPs in CISA Critical Advisories?

Depending on what the world’s threat actors are up to and whether their activity is detected, CISA may issue a cybersecurity advisory (CSA) every few days or have nothing for a month. It’s hard to predict, and you never know what’s coming your way. One thing is certain: If you managed cybersecurity for a critical infrastructure entity and this #StopRansomware: BianLian Ransomware Group CSA landed in your inbox, you would probably want to take swift action.

4 Tips to Improve Cybersecurity for Your Business

Businesses of all sizes must be concerned about cybersecurity in today's interconnected world. Trust and survival depend on your company's ability to keep private information secret, protect consumer data, and repel cyberattacks. To better protect your company online, we've compiled five tried-and-true strategies.

CVE-2023-27997: Critical Fortinet Fortigate SSL-VPN RCE Vulnerability

On June 9th 2023, security researchers from Olympe CyberDefense published a blog stating that they responsibly disclosed a critical vulnerability in SSL-VPN firewalls to Fortinet. This vulnerability, CVE-2023-27997, is a critical, pre-authentication RCE vulnerability that impacts all versions of Fortinet SSL-VPN firewalls, even if multi-factor authentication (MFA) is enabled. The security researchers responsibly disclosed the vulnerability to Fortinet.

Mass Exploitation of MOVEit Transfer Critical Vulnerability - Recommended Mitigations and How Forescout Can Help

On May 31, Forescout Research – Vedere Labs uncovered a significant incident where threat actors exploited a critical zero-day vulnerability in the MOVEit Transfer software, which resulted in unauthorized access to and exfiltration of private data, as well as privilege escalation. MOVEit Transfer is a widely adopted managed file transfer (MFT) solution that enables organizations to securely exchange files with their business partners and customers.

Shielding Against the Most Recent Fortinet Vulnerability

During a red team assessment for a client, Charles Fol and Dany Bach from LEXFO, discovered a heap overflow bug in Fortigate’s SSL VPN that can be exploited to achieve remote code execution on Fortigate instances. This vulnerability is reachable without authentication, and can be used to execute arbitrary code on vulnerable systems, which could lead to a complete compromise of the system.