
Fortinet Releases Security Updates for Multiple Products
Fortinet has recently announced critical security updates addressing vulnerabilities across several of its products, including FortiOS and FortiProxy. These updates aim to mitigate risks associated with out-of-bounds write, stack-based buffer overflow, authorization bypass, and improper authentication vulnerabilities that could potentially allow attackers to execute arbitrary code, commands, or gain unauthorized access.
Analysis from our SOC team
When major vulnerabilities are discovered on a device as sensible as the corporate firewall, urgent update is usually recommended.
The European Union (EU) Parliament approved Tuesday new cyber resilience standards to protect all digital products in the EU from cyber threats. Already agreed with the Council last December, the regulation aims to ensure that products with digital features are secure to use, resilient against cyber threats, and provide enough information about their security properties.
The regulation aims to ensure high cybersecurity for products with digital elements and their integrated remote data processing solutions. This includes defining remote data processing as processing is done away from the user’s device, ensuring manufacturers secure products regardless of data location. This covers situations like mobile apps accessing manufacturer-provided services, falling under the regulation’s scope.
The legislation was approved with 517 votes in favor, 12 against and 78 abstentions. It will now have to be formally adopted by Council, too, in order to come into law.
Analysis from our SOC team
The EU Parliament’s approval of the Cyber Resilience Act marks a pivotal advancement in cybersecurity, mandating robust security measures for digital products.
This legislation not only emphasizes the necessity of integrating cybersecurity from the design phase of digital elements but also addresses the critical cybersecurity skills gap, highlighting the indispensable role of human expertise in complementing technological safeguards.
For IT and management professionals, this represents a significant shift towards prioritizing security in the digital landscape, ensuring a harmonized approach that reduces legal uncertainties and enhances the resilience of digital infrastructure across the European Union. This act is a testament to the EU’s commitment to fostering a secure, trustworthy digital environment in an era of escalating cyber threats.
Cloud account threats increased 16-fold in 2023, with attackers adopting new techniques in these environments, according to Red Canary’s 2024 Threat Detection Report.
Researchers found that detections associated with T1078.004: Cloud Accounts, the MITRE ATT&CK technique for cloud account compromises, was the fourth most prevalent technique used by threat actors in 2023, up from 46th place in 2022.
Analysis from our SOC team
Because of its flexibiliy and ease of deployment, cloud computing is seen by many IT managers as the go-to solution. Unfortunately, moving legacy applications to the cloud is usually done without consulting security experts that can assist in safe deployment.
Threat actors have seen this as an opportunity to focus their efforts on this new computing field.
While threat actors converged on Ivanti edge devices earlier this year, one of them moved quicker than the rest, deploying a one-day exploit the day after its public disclosure.
“Magnet Goblin,” recently named in a Check Point research blog post, was one of the fastest to capitalize on that potential. Within a day after the release of a proof-of-concept (PoC) exploit, the group had malware in-hand capable of exploiting it.
Analysis from our SOC team
When it’s time to update critical devices, it’s better not to waste a minute. Major flaws (rated 9 or more on the CVSS scale) should be remediated as soon as possible.
Accelerating competition between nation-states, regional conflicts with far-reaching impact, and non-state threat actors with unprecedented capabilities are three of the main cyber threats the US intelligence community (IC) will face over the next few months.
This is according to the Office of the Director of National Intelligence’s (ODNI) 2024 Annual Assessment of the US Intelligence Community, a report reflecting the collective insights of the US IC.
Analysis from our SOC team
Threat landscape evaluation by US agencies often proves valid for the whole world. That kind of high-level evaluation is useful to prioritize security improvements in any infrastructure.