Best Practices for Managing Open-Source Vulnerabilities in Enterprise Deployments

We are facing a challenge with managing vulnerabilities in certain open-source libraries used in our enterprise product. The current versions of these libraries have known vulnerabilities flagged by our customer’s security team, but upgrad… Continue reading Best Practices for Managing Open-Source Vulnerabilities in Enterprise Deployments

BeyondTrust fixes critical vulnerability in remote access, support solutions (CVE-2024-12356)

BeyondTrust has fixed an unauthenticated command injection vulnerability (CVE-2024-12356) in its Privileged Remote Access (PRA) and Remote Support (RS) products that may allow remote code execution, and is urging organizations with on-premise installat… Continue reading BeyondTrust fixes critical vulnerability in remote access, support solutions (CVE-2024-12356)

Clop ransomware claims responsibility for Cleo data theft attacks

Lawrence Abrams reports: The Clop ransomware gang has confirmed to BleepingComputer that they are behind the recent Cleo data-theft attacks, utilizing zero-day exploits to breach corporate networks and steal data. Cleo is the developer of the managed f… Continue reading Clop ransomware claims responsibility for Cleo data theft attacks