Luca Donetti Dontin Il sito di un pazzo sistemista! - page 6

Should Security Solutions Be Secure? Maybe We're All Wrong – Fortinet FortiSIEM Pre-Auth Command Injection (CVE-2025-25256)

Should Security Solutions Be Secure? Maybe We're All Wrong – Fortinet FortiSIEM Pre-Auth Command Injection (CVE-2025-25256)

It’s Friday, but we’re here today with unscheduled content – pushing our previously scheduled shenanigans to next week. Fortinet is no stranger to the watchTowr Labs research team. Today we’re looking at CVE-2025-25256 – a pre-authentication command injection in FortiSIEM that lets an attacker compromise…

Continue reading →

CISA Releases Thirty-Two Industrial Control Systems Advisories

CISA released thirty-two Industrial Control Systems (ICS) advisories on August 14, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-226-01 Siemens SIMATIC RTLS Locating Manager ICSA-25-226-02 Siemens COMOS ICSA-25-226-03 Siemens Engineering Platforms ICSA-25-226-04 Siemens Simcenter Femap ICSA-25-226-05 Siemens Wibu CodeMeter Runtime ICSA-25-226-06 Siemens Opcenter…

Continue reading →

CISA and Partners Release Asset Inventory Guidance for Operational Technology Owners and Operators

CISA, along with the National Security Agency, the Federal Bureau of Investigation, Environmental Protection Agency, and several international partners, released comprehensive guidance to help operational technology (OT) owners and operators across all critical infrastructure sectors create and maintain OT asset inventories and supplemental taxonomies.  An…

Continue reading →

ICMP ‘Destination Unreachable’ Messages @ SharkFest’24 EU

I did a presentation at Sharkfest’24 Eu in Vienna, the “Wireshark Developer and User Conference“, about the topic: “Unveiling Network Errors – A Deep Dive into ICMP ‘Destination Unreachable’ Messages“. It covers the following: “Effective troubleshooting of network issues is a critical concern… Source link…

Continue reading →

5 Common Cloud Security Gaps and How Lacework FortiCNAPP Can Close Them

Learn how Fortinet’s CNAPP addresses the top cloud security gaps by unifying posture management, runtime protection, CDR, and application-layer defense to reduce risk across hybrid and multi-cloud environments. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

From ClickFix to Command: A Full PowerShell Attack Chain

A regionally targeted PowerShell-based campaign used phishing lures, obfuscation, and RAT delivery to infiltrate Israeli organizations. Learn how the attack chain worked—and how Fortinet blocked it. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

CISA Releases Malware Analysis Report Associated with Microsoft SharePoint Vulnerabilities

CISA published a Malware Analysis Report (MAR) with analysis and associated detection signatures on files related to Microsoft SharePoint vulnerabilities: CVE-2025-49704 [CWE-94: Code Injection], CVE-2025-49706 [CWE-287: Improper Authentication], CVE-2025-53770 [CWE-502: Deserialization of Untrusted Data], and CVE-2025-53771 [CWE-287: Improper Authentication] Cyber threat actors have chained CVE-2025-49704…

Continue reading →

CISA Issues ED 25-02: Mitigate Microsoft Exchange Vulnerability

Today, CISA issued Emergency Directive (ED) 25-02: Mitigate Microsoft Exchange Vulnerability in response to CVE-2025-53786, a vulnerability in Microsoft Exchange server hybrid deployments.   ED 25-02 directs all Federal Civilian Executive Branch (FCEB) agencies with Microsoft Exchange hybrid environments to implement required mitigations by 9:00…

Continue reading →

Page 6 of 181 ← First ... 4 5 6 7 8 ... Last →