Cisco Issues Patch for High-Severity VPN Hijacking Bug in Secure Client
Mar 08, 2024NewsroomNetwork Security / Vulnerability Cisco has released patches to address a high-severity security flaw impacting its Secure Client software that could be exploited by a threat actor to open a VPN session with that of a targeted user. The networking equipment company described the vulnerability, tracked as CVE-2024-20337 (CVSS score: 8.2), as allowing […]
NSA Guidelines; a Utility SBOM Case Study; Lava Lamps
Welcome to CISO Corner, Dark Reading’s weekly digest of articles tailored specifically to security operations readers and security leaders. Each week, we’ll offer articles gleaned from across our news operation, The Edge, DR Technology, DR Global, and our Commentary section. We’re committed to presenting a diverse set of perspectives to support the job of operationalizing […]
Supercharge your Cisco HIMSS24 experience
Cisco Customer Experience Healthcare Practice helps customers leverage the use of Cisco technology to increase business value, remove burdens and move healthcare forward faster. Health systems face several challenges, including mountains of technical debt, staffing issues and resource constraints, manual and fragmented workflows, and often, a lack of access to holistic, real-time data insights. They […]
Critical Fortinet flaw may impact 150,000 exposed devices
Scans on the public web show that approximately 150,000 Fortinet FortiOS and FortiProxy secure web gateway systems are vulnerable to CVE-2024-21762, a critical security issue that allows executing code without authentication. America’s Cyber Defense Agency CISA confirmed last month that attackers are actively exploiting the flaw by adding it to its Known Exploited Vulnerabilities (KEV) […]
Microsoft Confirms Russian Hackers Stole Source Code, Some Customer Secrets
Mar 09, 2024NewsroomCyber Attack / Threat Intelligence Microsoft on Friday revealed that the Kremlin-backed threat actor known as Midnight Blizzard (aka APT29 or Cozy Bear) managed to gain access to some of its source code repositories and internal systems following a hack that came to light in January 2024. “In recent weeks, we have seen […]
Broke Cyber Pros Flock to Cybercrime Side Hustles
Cybersecurity professionals are finding it more attractive to take their talents to the Dark Web and earn money working on the offensive side of cybercrime. This puts enterprises in a tough spot: cut into profit growth to keep cybersecurity skills from flowing to the highest bidder, or figure out how to defend their networks against […]
What are Pig Butchering Scams and How Do They Work?
“Jessica” cost him one million dollars. In an account to Forbes, one man described how he met “Jessica” online.i Readily, they formed a friendship. Turns out, “Jessica” was a great listener, particularly as he talked about the tough times he was going through. Through chats on WhatsApp, he shared the struggles of supporting his family […]