Threat & Research Team Blog
CVE-2024-24919 - Zero-Day Vulnerability Exploiting Check Point Security Gateways
CVE-2024-24919, has recently been identified in Check Point Security Gateways. This high-severity information disclosure vulnerability is actively being exploited in the wild, posing significant risks to organizations using Check Point products. This blog provides a comprehensive overview of CVE-2024-24919, steps to mitigate its impact, and indicators of compromise (IOCs) to help detect potential exploitation.
Ransomware Exploits VMware ESXi Vulnerabilities
Ransomware attacks targeting VMware ESXi infrastructure have exhibited a predictable yet alarming pattern, highlighting the vulnerabilities and misconfigurations inherent in virtualization platforms. Despite the varied nature of the ransomware deployed, the sequence of attacks remains consistent, making ESXi a lucrative target for cybercriminals.
JOIN US AT ICS MIAMI NOVEMBER 2nd- 3rd
ICSMiami
A Critical Infrastructure Cybersecurity Conference— Join Cybersecurity Executives and Subject Matter Experts in Aventura, Florida to discuss the threats, use cases, and solutions needed to meet critical infrastructure cybersecurity needs.
CMMC 2.1 Explained: How is the Cybersecurity Maturity Model Certification Program Changing?
CMMC 2.1 Explained: How is the Cybersecurity Maturity Model Certification Program Changing? Find out how updated CMMC regulations impact security compliance for government agencies and their partners.
Managing Cybersecurity Risk for Small Government Agencies: Double Extortion Explained
Managing Cybersecurity Risk for Small Government Agencies: Double Extortion Explained Cybercriminals are increasingly targeting small public administration offices instead of large, federal-level targets.