Threat & Research Team Blog

Maverc Technologies Secures Statewide Cyber Security Solutions Contract with the Florida Department of Management Services
Wendy-Paige Hyde Wendy-Paige Hyde

Maverc Technologies Secures Statewide Cyber Security Solutions Contract with the Florida Department of Management Services

Maverc Technologies secures State Term Contract No. 43230000-24-STC with the Florida Department of Management Services (DMS) to provide cybersecurity solutions for government agencies. Under this statewide contract, Maverc will deliver Endpoint Detection and Response (EDR), Identity and Access Management (IAM), Threat Intelligence, Penetration Testing, and more, helping Florida strengthen its digital security and compliance with NIST, HIPAA, and CJIS. Learn more about this strategic cybersecurity initiative.

Read More
CVE-2024-24919 - Zero-Day Vulnerability Exploiting Check Point Security Gateways
Fady Abdeltawab Fady Abdeltawab

CVE-2024-24919 - Zero-Day Vulnerability Exploiting Check Point Security Gateways

CVE-2024-24919, has recently been identified in Check Point Security Gateways. This high-severity information disclosure vulnerability is actively being exploited in the wild, posing significant risks to organizations using Check Point products. This blog provides a comprehensive overview of CVE-2024-24919, steps to mitigate its impact, and indicators of compromise (IOCs) to help detect potential exploitation.

Read More
Juniper Networks Addresses Critical Vulnerabilities in SRX Firewalls and EX Switches (CVE-2024-21591)
Fady Abdeltawab Fady Abdeltawab

Juniper Networks Addresses Critical Vulnerabilities in SRX Firewalls and EX Switches (CVE-2024-21591)

Juniper Networks has taken significant steps to address critical vulnerabilities in its SRX Series firewalls and EX Series switches. The most noteworthy of these is the remote code execution (RCE) flaw, CVE-2024-21591, with a CVSS score of 9.8. This vulnerability poses a serious threat, allowing unauthenticated attackers to exploit the J-Web configuration interfaces and potentially execute remote code or initiate a Denial-of-Service (DoS) attack.

Read More
Ransomware Exploits VMware ESXi Vulnerabilities
Fady Abdeltawab Fady Abdeltawab

Ransomware Exploits VMware ESXi Vulnerabilities

Ransomware attacks targeting VMware ESXi infrastructure have exhibited a predictable yet alarming pattern, highlighting the vulnerabilities and misconfigurations inherent in virtualization platforms. Despite the varied nature of the ransomware deployed, the sequence of attacks remains consistent, making ESXi a lucrative target for cybercriminals.

Read More
Precision Threat Intelligence is Vital to Securing Industrial Control Systems and Operational Technology Environments
Ross Seay Ross Seay

Precision Threat Intelligence is Vital to Securing Industrial Control Systems and Operational Technology Environments

More than half a million new malware variants are discovered every single day. Once discovered, cybersecurity practitioners add them to industry-wide data feeds that fuel a wide variety of security technologies. But there’s a problem.

The volume of incoming threats is so high that most analysts can’t use this data in a timely manner. Manually querying the threat intelligence database and looking for the one threat that matches your particular operating environment can take hours – precious time that analysts don’t have.

Read More
JOIN US AT ICS MIAMI NOVEMBER 2nd- 3rd
Guest User Guest User

JOIN US AT ICS MIAMI NOVEMBER 2nd- 3rd

ICSMiami
A Critical Infrastructure Cybersecurity Conference— Join Cybersecurity Executives and Subject Matter Experts in Aventura, Florida to discuss the threats, use cases, and solutions needed to meet critical infrastructure cybersecurity needs.

Read More
MOVEit Transfer Critical  Vulnerability Discovered – Patch Now
Emerging Threats, Zero-Day Tanya St James Emerging Threats, Zero-Day Tanya St James

MOVEit Transfer Critical Vulnerability Discovered – Patch Now

A critical vulnerability has been found in Progress MOVEit Transfer, posing a significant risk of unauthorized access and elevated privileges through SQL injection. The impact of this vulnerability has been felt across various sectors, including government, finance, media, aviation, and healthcare. The severity of the situation is highlighted by reports of data theft and exfiltration from prominent organizations within these industries.

Read More

Explore our Cybersecurity offerings today.