
A major cybersecurity incident has emerged with the leak of configuration files and VPN credentials for approximately 15,000 Fortinet FortiGate devices. This breach is believed to be connected to a previously exploited zero-day vulnerability from 2022, tracked as CVE-2022-40684. The leak has raised concerns about the security of these devices, which are widely used in enterprise environments. In addition, over 660,000 Rsync servers have been reported as exposed to code execution attacks, highlighting ongoing vulnerabilities in widely used software. Furthermore, a new UEFI Secure Boot bypass vulnerability (CVE-2024-7344) has been discovered, allowing attackers to run unsigned code during system boot, even with Secure Boot enabled. This vulnerability poses a significant risk to systems relying on UEFI for security. Cybersecurity experts are urging immediate action to mitigate these risks.
Finding some good news after a bad year for cyberattacks https://t.co/LcDOryxFzQ
Six vulnerabilities in the popular Rsync file-synchronizing tool were disclosed Wednesday, including critical and high-severity flaws that could risk remote code execution (RCE) and data leakage. #cybersecurity #infosec #ITsecurity https://t.co/ARtP0tc0fh
TechCrunch: "Clop ransomware gang names dozens of victims hit by Cleo mass-hack, but several firms dispute breaches" https://t.co/SDDqofjVvr