Security News > 2023 > February

Security researchers have released a proof-of-concept exploit for a critical-severity vulnerability in Fortinet's FortiNAC network access control suite. Proof-of-concept exploit code is also available from the company's repository on GitHub.

Security researchers have released a proof-of-concept exploit for a critical-severity vulnerability in Fortinet's FortiNAC network access control suite. Proof-of-concept exploit code is also available from the company's repository on GitHub.

Microsoft will start testing Bing Chat tones, enabling users to switch between receiving answers that are either more creative or more focused on their queries. We are "Going to begin testing an additional option that lets you choose the tone of the Chat from more Precise - which will focus on shorter, more search focused answers - to Balanced, to more Creative - which gives you longer and more chatty answers," the Bing Team said.

Google has started working to harden the security of Android at the firmware level, a component of the software stack that interacts directly with the various processors of a system on a chip. The plan is to expand the security in Android devices beyond the operating system, which runs on a multi-core CPU, to the other processors on the SoC for dedicated tasks like cellular communication, media processing, or security modules.

Value today is often tied with the ability to navigate technical infrastructure, and if you don't know much about the latest developments in infotech, cybersecurity and artificial intelligence, then you risk getting left behind. That's what makes the Modern Tech Skills Bundle such a worthy asset.

Although the nature of the intrusion is still undisclosed, it seems to be part of a wider trend of global ransomware attacks. On January 10th, the Royal Mail detected a cyber incident affecting delivery and collection across the UK. In even more recent news, the city of Oakland has declared a local state of emergency because of a ransomware attack that forced the city to take all its IT systems offline on February 8th. But what is a ransomware attack, who are the targeted groups, and how can organizations protect themselves?

Horizon3's Attack Team has released a PoC exploit for CVE-2022-39952, a critical vulnerability affecting FortiNAC, Fortinet's network access control solution. "Similar to the weaponization of previous archive vulnerability issues that allow arbitrary file write, we use this vulnerability to write a cron job to /etc/cron.d/payload. This cron job gets triggered every minute and initiates a reverse shell to the attacker," shared Zach Hanley, Chief Attack Engineer at Horizon3.

Cryptocurrency exchange Coinbase has fended off a cyberattack that might have been mounted by the same attackers that targeted Twillio, Cloudflare and many other companies last year. Leveraging smishing and vishing, the attackers tried to trick Coinbase employees into sharing login credentials and installing remote desktop applications, and were only partly successful: the company's incident response team quickly reacted to "Unusual activity" alerts and, in the end, the attackers were unable to access customer information or steal funds.

A sophisticated botnet known as MyloBot has compromised thousands of systems, with most of them located in India, the U.S., Indonesia, and Iran. "What makes Mylobot dangerous is its ability to download and execute any type of payload after it infects a host," Lumen's Black Lotus Labs said in November 2018.

To address these challenges, organizations are turning to predictive analytics and Machine Learning driven network security solutions as essential tools for securing their networks against cyber threats and the unknown bad. ML-driven network security solutions in cybersecurity refer to the use of self-learning algorithms and other predictive technologies to automate various aspects of threat detection. In summary, the mentioned drawbacks of rule-based security solutions highlight the significance of taking a more holistic approach to network security, which should nowadays include ML-powered Network Detection and Response solutions to complement traditional detection capabilities and preventive security measures.