WE HELP YOU PROTECT YOUR BUSINESS

Threat Intelligence Report on Fortinet Vulnerability

CVE-2024-23113 is a critical Remote Unauthenticated Code Execution (RCE) vulnerability affecting Fortinet’s FortiGate firewalls, FortiProxy, FortiPAM, and FortiSwitchManager devices. The flaw stems from improper input validation in the devices’ administrative web interface, allowing attackers to remotely execute arbitrary codes without the need for any authentication. If exploited, it could lead to full system compromise, granting unauthorized control over critical network infrastructure. With a CVSS score of 9.8, this vulnerability poses a severe global security risk. This report provides a comprehensive analysis of CVE-2024-23113, detailing its technical impact, exploitation methods, and real-world implications, while at the same time outlining detection techniques, mitigation strategies, and security recommendations to prevent large-scale exploitation.

Article Image

Latest

India Threat Landscape Report

The India Threat Landscape Report 2023 provides a comprehensive analysis of the evolving cyber threat environment, highlighting ransomware campaigns, state-sponsored cyber espionage, and critical infrastructure vulnerabilities. As technology advances, threats have grown in complexity, with threat actors exploiting geopolitical tensions, emerging technologies, and regulatory gaps. This report examines key adversaries, attack methodologies, and major cyber incidents, while assessing the impact of quantum computing, blockchain security risks, and compliance challenges. By detailing threat actor profiles, geopolitical influences, and strategic countermeasures, the report offers critical insights for policymakers and cybersecurity professionals, equipping them to strengthen defenses and navigate an increasingly volatile cyber landscape.

Article Image
Article Image

Secret Blizzard’s Exploitation of Storm-0156’s Infrastructure

Secret Blizzard is a Russian state-sponsored cyber espionage campaign, which showcases the increasing complexity of modern cyber warfare. Closely linked to the Federal Security Service (FSB), the operation was active between late 2022 and mid-2024 strategically hijacked infrastructure from Storm-0156, also known as Transparent Tribe or APT36, to mask its activities. By commandeering 33 command-and-control servers, it deployed custom malware such as TwoDash and Statuezy, targeting government bodies of Afghanistan and Indian defence institutions. This report provides a comprehensive analysis of Secret Blizzard’s tactics, its use of rival networks, and key security implications. The report also provides critical insights to the campaign and mitigation strategies, attribution challenges, and geopolitical ramifications.

Categories

More Reports

India Threat Landscape Report
Secret Blizzard’s Exploitation of Storm-0156’s Infrastructure
Threat Intelligence Report on Fortinet Vulnerability
Ministry of External Affairs Threat Intelligence Report
Cyber Threat Landscape: Critical Information Infrastructure and Defence Infrastructure in India