

Description:
The new security issue received the identifier CVE-2024-5806 and allowed attackers to bypass the authentication process in the Secure File Transfer Protocol (SFTP) module, which is responsible for file transfer operations over SSH. The CVE impacts the following versions:
Recommended Actions:
Take Action Now: System administrators are advised to block Remote Desktop Protocol (RDP) access to the MOVEit Transfer servers and restrict outbound connections to known/trusted endpoints.
External Links:
Description: Threat actors set up malicious advertisements on Google Search to attract users looking to download the new web browser. Since these installed the Arc browser as expected, it is unlikely that victims will realize they have become infected with malware.
Recommended Actions:
Take Action Now:
Notify users to be aware of sponsored results and recommend contacting the IT department for installing new software.
External Links:
Description: BitLocker’s main function is to protect data from theft or exposure. It encrypts a device, and it needs a key to decrypt. Threat actors are using malicious scripts to alter boot settings and enable BitLocker to encrypt the device.
Recommended Actions:
Take Action Now:
Using Mobile Device Management is recommended to enable BitLocker and store recovery keys.
External Links:
Description: Social engineering threats targeting the health sector are not only about phishing anymore. Spear phishing campaigns (Targeting specific people) are increasing, threat actors are also calling users pretending to be their IT team to force password changes or steal credentials.
Recommended Actions:
Take Action Now:
Leverage awareness training sessions to discuss how users will be contacted by the different departments of the organization and the official channels of communications to mitigate new social engineering risks.
External Links:
Description: Google has released a patch for the critical vulnerability CVE-2024-31320. This vulnerability could allow a threat actor to access and control an Android device without any permissions.
Recommended Actions:
Take Action Now:
Updating regularly devices and systems will prevent known vulnerabilities from being exploited.
External Links: