Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CVE-2024-4577 - A PHP CGI Argument Injection Vulnerability in Windows Servers

On June 7, 2024, a new critical PHP vulnerability CVE-2024-4577 was revealed, mainly impacting XAMPP on Windows. It happens when PHP runs in CGI mode with specific language settings, like Chinese or Japanese. The problem comes from how PHP handles certain characters, allowing attackers to inject code through web requests and take control of servers. This vulnerability, if exploited, could lead to the execution of arbitrary code, a scenario with severe consequences for system integrity and data security.

Massive Data Leak Targets New York Times: Implications and Cybersecurity Insights

In a startling cybersecurity development, an anonymous threat actor has posted what they claim to be 270GB of source code stolen from the New York Times on a popular imageboard website. This incident, reported on Friday, suggests the leak contains "basically all source code" from the publisher.

CVE-2024-29849: Veeam discloses Critical Vulnerability that allows attackers to bypass user authentication on its Backup Enterprise Manager web interface

On May 21, 2024, Veeam revealed a severe flaw across its Veeam Backup Enterprise Manager (VBEM) web interface that enables an unauthenticated attacker to log into the web interface as any user. Officially designated as CVE-2024-29849, the vulnerability presents a major threat with a CVSS V3 rating of 9.8 (critical). VBEM is a web-based platform that allows administrators to oversee Veeam Backup and Replication installations through a web interface console.

CrowdStrike Expands Support and Protection for AWS Services

At AWS re:Inforce 2024, CrowdStrike is announcing expanded AWS support to provide breach protection, enhanced visibility and faster response across your cloud environment. Let’s explore three cutting-edge CrowdStrike Falcon Cloud Security and CrowdStrike Falcon Next-Gen SIEM features that are changing the way organizations manage security risks.

CrowdStrike Named a Leader with "Bold Vision" in 2024 Forrester Wave for Cybersecurity Incident Response Services

CrowdStrike has been named a Leader in The Forrester Wave: Cybersecurity Incident Response Services, Q2 2024. This recognition demonstrates for us our unwavering commitment to providing the technology and services organizations need to detect and eliminate threats. “A product powerhouse in detection and response tech, CrowdStrike’s unwavering mission and vision are to stop breaches,” the report states.

Continuous Data Protection: A Guide to Safeguarding Your Data

Modern businesses operate in a data-centric world, where every byte of information holds the potential to drive growth, innovation, and competitive advantage. But as our reliance on data deepens, so does our vulnerability. Cyberthreats are evolving at an alarming pace, natural disasters loom as ever-present risks, and the complexities of modern IT environments—from huge cloud infrastructures to containerized applications—demand a new approach to data protection.

CISA Alerts on Extensively Exploited Linux Privilege Elevation Vulnerability

The two new vulnerabilities that the U.S. Cybersecurity & Infrastructure Security Agency (CISA) has added to its list of known exploited vulnerabilities (KEV) are both related to the privilege elevation of the Linux kernel.

Unified Security Platform for Managed Service Providers

We are WatchGuard Technologies, the answer for Managed Service Providers (MSPs) everywhere. WatchGuard’s Unified Security Platform is uniquely designed to support the growing popularity of managed security services in addition to self-managed deployments. It re-envisions security so that it is simplified, powerful, comprehensive, automated, intelligent, transparent, and aligned to today’s service delivery models.

Webinar Replay: State of Cyber Defense - Diagnosing Cyber Threats in Healthcare

Merging findings from the global survey we conducted with 1,000 security and risk leaders for the 2023 State of Cyber Defense: The False-Positive of Trust report with frontline threat intelligence collected from 3,000+ incident response cases, 700,000+ endpoints under monitoring and 100,000+ hours of offensive security engagements, this webinar provides a holistic view of cyber risk for the healthcare sector.