Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

CVE-2024-38428 Wget Vulnerability: All you need to know

On Sunday, June 2nd 2024, a fix commit was pushed for a vulnerability in GNU’s popular Wget tool. Two weeks later, the vulnerability was assigned the ID CVE-2024-38428 and later was classified as a critical vulnerability – with a CVSS score of 9.1. In this blog, we take a dive deep into this threat by seeing what caused it, what consequences it might have, and how it can be mitigated.

Advancing Threat Intelligence: JA4 fingerprints and inter-request signals

For many years, Cloudflare has used advanced fingerprinting techniques to help block online threats, in products like our DDoS engine, our WAF, and Bot Management. For the purposes of Bot Management, fingerprinting characteristic elements of client software help us quickly identify what kind of software is making an HTTP request. It’s an efficient and accurate way to differentiate a browser from a Python script, while preserving user privacy.

Enable Computer and User Accounts to be Trusted for Delegation

The policy setting ‘Enable computer and user accounts to be trusted for delegation’ for Administrators and No One allows users to change the Trusted for Delegation setting on a computer object in Active Directory. Abuse of this privilege could allow unauthorized users to impersonate other users on the network. The Windows security setting enable computer and user accounts to be trusted for delegation is a powerful security feature primarily used in enterprise environments.

Double Extortion Ransomware: What It Is and How To Avoid It

Double extortion ransomware is a type of cyber attack in which cybercriminals steal sensitive data and encrypt it. Then, cybercriminals threaten to release the stolen data unless the victim pays a ransom. The additional threat of exfiltration makes this type of cyber attack particularly damaging for organizations, as they face the risk of sensitive data being exposed to the public or sold on the dark web.

Ensuring Your Privacy: The Critical Role of Security in Choosing a VPN

Among the growing digital threats to privacy, picking out a Virtual Private Network with the right security features makes it very fundamental. The VPN will not only hide your IP address but will go ahead and encrypt your internet connection, thus helping maintain your privacy while online. On the other hand, not all VPNs are created equal. When it comes to the question of what security in a VPN is, it can enable one to make-without question-an informed decision towards guarding one's digital life.