Search results for: vulnerability

week in review

Week in review: Citrix and Fortinet RCEs, Microsoft fixes exploited zero-day

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Vulnerability with public PoC affects Cisco IP phones, fix unavailable (CVE-2022-20968) A high-risk stack overflow vulnerability (CVE-2022-20968) may allow attackers to DoS or possibly even execute code remotely on Cisco 7800 and 8800 Series IP phones, the company has confirmed. Critical FortiOS pre-auth RCE vulnerability exploited by attackers (CVE-2022-42475) A critical RCE vulnerability (CVE-2022-42475) in Fortinet’s operating system, FortiOS, is … More

Money

Protect AI emerges from stealth and raises $13.5 million

Protect AI emerged from stealth with $13.5 million seed funding and its first product, NB Defense. NB Defense addressess vulnerabilities in a core component used at the beginning of the machine learning supply chain – Jupyter Notebooks. This is a rapidly growing security issue which is increasing significantly annually as more organizations move machine learning into production environments. Today, there are over 10M publicly accessible notebooks, growing by 2M+ annually, with many more in private … More

Software

Red Hat Insights enhancements reduce risks in hybrid cloud operating environments

Red Hat announced several enhancements to Red Hat Insights, its predictive analytics offering. This includes integrations for ServiceNow and Slack, as well as expanded monitoring capabilities to identify known threats in Red Hat OpenShift and Red Hat Enterprise Linux. According to an IDC survey, “ease of deployment (33.5%), speed (31.9%), and vulnerability prioritization (30.4%) were the top three capabilities sought in DevSecOps tools. Taken together, this data suggests DevSecOps vendors must offer solutions that are … More

security platform

Malwarebytes strengthens threat prevention capabilities in Nebula platform

Malwarebytes expands Malwarebytes Nebula platform with additional threat prevention capabilities developed specifically for resource constrained organizations to reduce attack surfaces from a simple, easy-to-use cloud-based interface. The company released Cloud Storage Scanning (CSS) to also protect business-critical assets stored in the cloud and prevent the introduction of malware and other threats into digital ecosystems. “In our evolution from endpoint product to a holistic protection platform, we’re seeing strong adoption of our new threat prevention modules … More

security platform

DerSecur updates DerScanner to help users reduce false positives

DerSecur has updated DerScanner, a solution for monitoring the security of software and information systems. The new version allows correlating the results of static code analysis (SAST) with the results of dynamic code analysis (DAST). Their correlation will reduce false positives. Thanks to this, DerScanner users’ attention will be focused primarily on validated vulnerabilities and undocumented features, whose elimination is the first priority task. DerScanner 3.12 provides ability to do dynamic code analysis (DAST) of … More

Appointments

Skybox Security appoints Corey Williams as CMO

Corey Williams will leverage his extensive cybersecurity background to lead Skybox Security’s core marketing strategy and accelerate market growth. The seasoned marketing executive brings 25 years of experience leading initiatives for high-growth B2B companies. Before joining Skybox, Williams was the head of Identity Security Marketing for CyberArk, where he led the effort to establish the identity security category and reposition CyberArk as the leader in Identity Security. Additionally, he served as the vice president of … More

open source security

OSV-Scanner: A free vulnerability scanner for open-source software

After releasing the Open Source Vulnerabilities database (OSV.dev) in February, Google has launched the OSV-Scanner, a free command line vulnerability scanner that open source developers can use to check for vulnerabilities in their projects’ dependencies. Finding vulnerabilities in open-source dependencies “OSV.dev allows all the different open source ecosystems and vulnerability databases to publish and consume information in one simple, precise, and machine readable format,” explained Rex Pan, a software engineer with the Google Open Source … More

security platform

Catalogic Software DPX 4.9 improves quality of alerts for backup administrators

Catalogic Software releases the latest version of Catalogic DPX, the company’s enterprise data protection software. DPX 4.9 builds on GuardMode, first introduced in July, now available for Linux servers and Samba shares and DPX vPlus, cloud data protection for Azure Virtual Machines (VMs), Azure Stack and Google Compute Engine VMs. With these updates, Catalogic delivers one of the widest data protection and backup coverage matrices for private, public and hybrid-cloud environments. “GuardMode is an amazing … More

patch Tuesday

Microsoft fixes exploited zero-day, revokes certificate used to sign malicious drivers (CVE-2022-44698)

It’s December 2022 Patch Tuesday, and Microsoft has delivered fixes for 50+ vulnerabilities, including a Windows SmartScreen bypass flaw (CVE-2022-44698) exploited by attackers to deliver a variety of malware. CVE-2022-44698 CVE-2022-44698 affects all Windows OS versions starting from Windows 7 and Windows Server 2008 R2. “The vulnerability has low complexity. It uses the network vector, and requires no privilege escalation. However, it does need user interaction; attackers need to dupe a victim into visiting a … More

Fortinet

Critical FortiOS pre-auth RCE vulnerability exploited by attackers (CVE-2022-42475)

A critical RCE vulnerability (CVE-2022-42475) in Fortinet’s operating system, FortiOS, is being exploited by attackers, reportedly by a ransomware group. “Fortinet is aware of an instance where this vulnerability was exploited in the wild,” the company said in an advisory published on Monday, but offered no specific details about the attack. About CVE-2022-42475 CVE-2022-42475 is a heap-based buffer overflow vulnerability in FortiOS, and “may allow a remote unauthenticated attacker to execute arbitrary code or commands … More

security platform

Palo Alto Networks Xpanse Active ASM evaluates cyber risks

Palo Alto Networks has introduced a new Cortex capability: Xpanse Active Attack Surface Management, or Xpanse Active ASM. This helps security teams not just find but also fix their known and unknown internet-connected risks. Xpanse Active ASM equips organizations with automation to give them the edge over attackers. “While the fundamental need for attack surface management hasn’t changed, the threat landscape today is much different. Organizations need an active defense system that operates faster than … More

Cisco IP Phone 7800 Series

Vulnerability with public PoC affects Cisco IP phones, fix unavailable (CVE-2022-20968)

A high-risk stack overflow vulnerability (CVE-2022-20968) may allow attackers to DoS or possibly even execute code remotely on Cisco 7800 and 8800 Series IP phones, the company has confirmed. Cisco‘s PSIRT is also aware that proof-of-concept exploit code is available for the vulnerability and that the flaw has been publicly discussed, but they are not aware of active attacks exploiting it. About CVE-2022-20968 Cisco IP Phone 7800 and 8800 Series are enterprise-grade devices for video … More