Tuesday , December 24 2024
vulnarabalities

Fortinet report
Attackers exploiting vulnerabilities 50% faster, just 4.76 days

Fortinet reported that in the second half of 2023, the average time form the disclosure of a vulnerability to its active exploitation in the wild decreased to just 4.76 days a 43% reduction compared to the 1st half of the year.

Fortinet’s 2H Global landscape report indicate that hackers to rush to infiltrates’ the networks to deploy malicious payloads giving less chance to the organization to patch the vulnerable system.

New G-Door Vul Allow Hackers Bypass Microsoft 365 Security With Google Docs

A newly discovered vulnerability called "G-Door" enables malicious actors to bypass Microsoft 365 security by exploiting unmanaged Google Docs accounts....
Read More
New G-Door Vul Allow Hackers Bypass Microsoft 365 Security With Google Docs

CVE-2024-53961
Adobe alerts of critical ColdFusion bug with PoC exploit available

Adobe has issued urgent security updates for ColdFusion versions 2023 and 2021 to fix a critical vulnerability (CVE-2024-53961). This flaw...
Read More
CVE-2024-53961  Adobe alerts of critical ColdFusion bug with PoC exploit available

Splunk targets Bangladeshi market: Investing in local talent

Splunk, a unified security and observability platform turn its focuses on Bangladeshi market. On Monday (23 December) Splunk's local partner...
Read More
Splunk targets Bangladeshi market: Investing in local talent

Critical PHP Zero-Day Vulnerability found in Craft CMS To Gain RCE

A major security flaw in Craft CMS, a popular PHP content management system, has been found, enabling unauthenticated remote code...
Read More
Critical PHP Zero-Day Vulnerability found in Craft CMS To Gain RCE

For US$2.6bn, Mastercard acquires threat intelligence firm Recorded Future

Mastercard has completed its acquisition of Recorded Future, an AI-based threat intelligence provider. Mastercard has acquired the company for $2.65...
Read More
For US$2.6bn, Mastercard acquires threat intelligence firm Recorded Future

Eight New ICS Advisories released by CISA

CISA has released eight advisories on vulnerabilities in Industrial Control Systems (ICS). These vulnerabilities affect essential software and hardware in...
Read More
Eight New ICS Advisories released by CISA

Authority Denies
Hacker claim ransomware attack on Indonesia’s state bank BRI

Bank Rakyat Indonesia (BRI), the largest state bank by assets, has assured customers that their data and funds are secure...
Read More
Authority Denies  Hacker claim ransomware attack on Indonesia’s state bank BRI

London-based company “Builder.ai” reportedly exposed 1.2 TB data

Cybersecurity researcher Jeremiah Fowler reported to Website Planet that he found a non-password-protected 1.2 TB dataset containing over 3 million...
Read More
London-based company “Builder.ai” reportedly exposed 1.2 TB data

(CVE-2024-12727, CVE-2024-12728, CVE-2024-12729)
Sophos resolved 3 critical vulnerabilities in Firewall

Sophos has fixed three separate security vulnerabilities in Sophos Firewall.  The vulnerabilities CVE-2024-12727, CVE-2024-12728, and CVE-2024-12729 present major risks, such...
Read More
(CVE-2024-12727, CVE-2024-12728, CVE-2024-12729)  Sophos resolved 3 critical vulnerabilities in Firewall

“Workshop on Cybersecurity Awareness and Needs Analysis” held at BBTA

A time-demanding workshop on "Cybersecurity Awareness and Needs Analysis" was held on Thursday (December 19) at Bangladesh Bank Training Academy...
Read More
“Workshop on Cybersecurity Awareness and Needs Analysis” held at BBTA

Derek Manky, Chief Security Strategist at Fortinet’s FortiGuard Labs said, “The pressure on already stretched cyber-defense resources has intensified with the time-to-exploit decreasing significantly to just 4.76 days,”.

“The ability to quickly sift through a prioritized list of vulnerabilities, effectively managing these ‘ticking time bombs,’ is now more critical than ever.”

According to the report, more than 6,00,000 network sensors capture threat event of live production environment across the globe where 41% organizations detected actively exploitation less than one month old. Threat actor leveraging this narrow window to breach the systems through unpatched vulnerabilities.

Fortinet observed in the 2nd half of 2023, Hackers were in the target of IOT devices and vendors like D-link, Zyxel, Mikro Tik and Dasan. Caitlin Condon, senior manager of security research at Rapid7 said, “A large number of vulnerabilities are being exploited before security teams have any time to implement patches or other mitigations,”.

In 2023, There were some widely exploited vulnerabilities which impacted a range of famous software platforms and applications like

PaperCut NG (CVE-2023-27350) – Exploited by LockBit ransomware
Google Chrome (CVE-2023-0699) – Exploited by LockBit ransomware
Fortra GoAnywhere (CVE-2023-0669) – Exploited by Cl0p ransomware
MOVEit Transfer (CVE-2023-34362) – Exploited by Cl0p ransomware
Citrix NetScaler ADC and Gateway (CVE-2023-4966) – Exploited by LockBit ransomware.

Security experts are recommended that organizations use a combination of scanning and detection technologies, thoroughly list all public-facing assets, and priorities patching based on actual threat activity. Click here to read out the Fortinet’s Global Threat Landscape Report 2H 2023.

Check Also

Sophos Firewall

(CVE-2024-12727, CVE-2024-12728, CVE-2024-12729)
Sophos resolved 3 critical vulnerabilities in Firewall

Sophos has fixed three separate security vulnerabilities in Sophos Firewall.  The vulnerabilities CVE-2024-12727, CVE-2024-12728, and …

Leave a Reply

Your email address will not be published. Required fields are marked *