Breaking Down the Latest August 2023 Patch Tuesday Report

Breaking Down the Latest August 2023 Patch Tuesday Report

Application Security, Cryptography, Cryptography, Cyber Security
The August 2023 Patch Tuesday report has been released, providing critical information for organizations and individuals to address security vulnerabilities and software updates. This monthly event plays a crucial role in maintaining the security and stability of the Windows operating system and various other software products people rely on. In this article, we’ll break down the key highlights of the August 2023 Patch Tuesday report, focusing on the most pressing concerns for users and administrators. Notably, Microsoft has released fixes for 88 vulnerabilities in August 2023 Patch Tuesday report, out of which 6 were rated Critical. Microsoft also warned about the active exploitation of 1 vulnerability. Again, as with other Patch Tuesday reports, Remote Code Execution (RCE) vulnerability has topped the list with 23 occurrences in the list of vulnerabilities. Let’s break…
Read More
How to Fix CVE-2023-27997- A Critical Heap-Based Buffer Overflow Vulnerability in FortiOS?

How to Fix CVE-2023-27997- A Critical Heap-Based Buffer Overflow Vulnerability in FortiOS?

Cryptography
In Fortigate’s June PSIRT Advisory Report, Fortigate has published a critical heap-based buffer overflow vulnerability in ForitOS, which has been tracked under a CVE ID CVE-2023-27997. According to the Advisory Report, the flaw has been assigned a CVSS score of 9.2 out of 10 on the scale. The flaw allows a remote attacker to execute arbitrary code or commands using a specifically crafted request on the vulnerable release. Considering its criticality, we urge all Fortigate users to fix the flaw at the earliest. We have published this post to let you know how to fix CVE-2023-2799, a heap-based buffer overflow vulnerability in FortiOS. Based on research published by BishopFox, approximately more than 330,000 devices are prone to vulnerability. In a comprehensive report unveiled last week, cybersecurity powerhouse Bishop Fox revealed the startling vulnerability scale within the Fortinet…
Read More
Exploring CyberChef: The Cyber Swiss Army Knife of Security Analysts (SOC Analyst)

Exploring CyberChef: The Cyber Swiss Army Knife of Security Analysts (SOC Analyst)

Application Security, Application/Appliance, Best Reads, Cloud & OS Platforms, Cryptography, Cyber Security, INFOSEC, Network Security, Pen Testing
In this tutorial blog, we are introducing a free, open-source, web based security analysis tool that empowers security enthusiasts and professionals with an array of functionalities. Welcome to the intriguing world of CyberChef, dubbed the “Cyber Swiss Army Knife.” We published this blog post to help security analysts (SOC Analysts) to understand what CyberChef is, its key features, how to install it, and ways to leverage it effectively in security analysis using its features like data encoding, cryptography, file operations, networking, and more. Whether you’re a beginner or a seasoned professional, CyberChef’s flexibility and power make it a compelling tool in your cybersecurity arsenal. Buckle up, as we decode the intricacies of this versatile tool and its application in our security-driven digital landscape. What is CyberChef and How to Install…
Read More
How to Set Up Multifactor Authentication on Your Windows 11?

How to Set Up Multifactor Authentication on Your Windows 11?

Application Security, Application/Appliance, Cloud & OS Platforms, Cryptography, Cryptography, Cyber Security, Tutorials, Windows
Multifactor authentication is an important security measure that can help protect your Windows account from being hacked. By requiring more than one form of authentication, it makes it much harder for attackers to gain access to your account. We created this post to let you know how to set up multifactor authentication on your Windows 11 using Microsoft’s Authenticatior App. There are many different ways to set up multifactor authentication on your Windows. One popular option is to use a physical token, such as a USB key, in addition to your password. Another option is to use biometric authentication, such as fingerprint or iris scanning, in the same way, you can also use Microsoft Authenticator App, a secure soft token application to generate 6 digit soft tokens. No matter which method you choose, multifactor authentication can…
Read More