by Fortify Security Team | Sep 28, 2024 | Cyberthreat Research
OVERVIEW: Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for remote code execution. Android is an operating system developed by Google for mobile devices, including, but not limited to,...
by Fortify Security Team | Sep 28, 2024 | Cyberthreat Research
Summary The default configuration in Microsoft Windows 10 v1809 and newer includes an elevation of privilege vulnerability, because of overly permissive Access Control Lists (ACLs) in the Security Accounts Manager (SAM) database, as well as multiple other system...
by Fortify Security Team | Sep 28, 2024 | Cyberthreat Research
Fortify 24×7 is tracking various public weaponized exploits for a remote code execution vulnerability affecting the Windows Print Spooler service (spoolsv.exe): CVE-2021-1675 and an out of band patch for CVE-2021-34527, also known as PrintNightmare. The...
by Fortify Security Team | Apr 1, 2024 | Security Operations, Services
In today’s digital landscape, cyber threats are constantly evolving and becoming more sophisticated. As a result, organizations are increasingly relying on security operations center (SOC) analysts to protect their networks and data from cyber attacks. In this...
by Fortify Security Team | Mar 31, 2024 | Security Operations, Services
In today’s digital landscape, cyber threats are becoming increasingly sophisticated and prevalent. As a result, organizations are investing in security operations centers (SOCs) to protect their networks and data. Within these SOCs, SOC analysts play a crucial...