Security News > 2024 > March

Exploit released for Fortinet RCE bug used in attacks, patch now
2024-03-21 15:17

Security researchers have released a proof-of-concept exploit for a critical vulnerability in Fortinet's FortiClient Enterprise Management Server software, which is now actively exploited in attacks.On Thursday, one week after Fortinet released security updates to address the security flaw, security researchers with Horizon3's Attack Team published a technical analysis and shared a proof-of-concept exploit that helps confirm if a system is vulnerable without providing remote code execution capabilities.

Over 800 npm Packages Found with Discrepancies, 18 Exploit 'Manifest Confusion'
2024-03-21 14:26

New research has discovered over 800 packages in the npm registry which have discrepancies from their registry entries, out of which 18 have been found to exploit a technique called manifest...

What the Latest Ransomware Attacks Teach About Defending Networks
2024-03-21 14:02

Here's a lowdown on some recent ransomware attacks, lessons worth learning from them, and tips to help limit ransomware risk. Ransomware attacks have knock-on financial impacts when companies need to swiftly shut down systems that might form the backbone of their normal operations.

AndroxGh0st Malware Targets Laravel Apps to Steal Cloud Credentials
2024-03-21 12:48

Cybersecurity researchers have shed light on a tool referred to as AndroxGh0st that's used to target Laravel applications and steal sensitive data. "It works by scanning and taking out important...

Microsoft confirms Windows Server issue behind domain controller crashes
2024-03-21 12:27

Microsoft confirmed that a memory leak introduced with the March 2024 Windows Server security updates is behind a widespread issue causing Windows domain controllers to crash. The known issue impacts all domain controller servers with the latest Windows Server 2012 R2, 2016, 2019, and 2022 updates.

The best free Syslog servers
2024-03-21 12:11

A Syslog server will only collect messages in the Syslog format but it is possible to change other formats into the Syslog layout before sending them to a Syslog server; this is called "Conversion." The other option is to set up a non-specific TFTP server and implement format conversion through a post-receipt process; this is called "Consolidation." If you don't convert either before or after the transfer, you will be storing raw log messages. If you receive log messages through a Syslog server, they will be written either to files or to a database in the Syslog format.

UK council won't say whether two-week 'cyber incident' impacted resident data
2024-03-21 11:37

Leicester City Council continues to battle a suspected ransomware attack while keeping schtum about the key details. The Register has repeatedly asked for a confirmation or denial of ransomware's involvement from the council, but after ignoring us for ten days it finally replied today, only to say it still couldn't share anything beyond official statements.

How to Accelerate Vendor Risk Assessments in the Age of SaaS Sprawl
2024-03-21 11:30

In today's digital-first business environment dominated by SaaS applications, organizations increasingly depend on third-party vendors for essential cloud services and software solutions. As more...

The best network monitoring tools
2024-03-21 11:26

Network monitoring tools provide automated network discovery and often also draw up network topology maps. Network device monitoring is often also referred to as network performance monitoring.

Public AI as an Alternative to Corporate AI
2024-03-21 11:03

When tech billionaires and corporations steer AI, we get AI that tends to reflect the interests of tech billionaires and corporations, instead of the public. To benefit society as a whole we need an AI public option-not to replace corporate AI but to serve as a counterbalance-as well as stronger democratic institutions to govern all of AI. Like public roads and the federal postal system, a public AI option could guarantee universal access to this transformative technology and set an implicit standard that private services must surpass to compete.

#AI