IntroductionCVE-2024-6768 is a vulnerability in the Common Log File System (CLFS.sys) driver of Windows, caused by improper validation of specified quantities in input data. This flaw leads to an unrecoverable inconsistency, triggering the KeBugCheckEx function and resulting in a Blue Screen of Death (BSoD). The issue affects all versions of Windows 10 and Windows 11, Windows Server 2016, Server...
Superior Security, Continuous ComplianceTripwire is the industry’s leading file integrity monitoring (FIM) and security configuration management (SCM) provider because we’ve optimized our solutions over 25+ years to keep pace with ever-evolving threats and compliance requirements. Thousands of organizations across the globe trust Tripwire to give them the real-time integrity monitoring data they...
Fortra recently uncovered a vulnerability in Windows that can cause a blue screen of death. Today, Fortra issued an advisory for Windows vulnerability CVE-2024-6768. Originally published in Forbes.Excerpt: “The potential problems include system instability and denial of service,” Ricardo Narvaja, principal exploit writer with security company Fortra, and the author of the report, said, “malicious...
A Denial of Service in CLFS.sys in Microsoft Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, and Windows Server 2022 allows a malicious authenticated low-privilege user to cause a Blue Screen of Death via a forced call to the KeBugCheckEx function.
Curious about Tripwire? Get all your questions answered by a product expert in a live demo customized around your cybersecurity and compliance goals. Use this form and one of our product specialists will be in touch to schedule a demo at your convenience. We look forward to speaking with you soon. Trusted by thousands of customers worldwide
...
Fortra Email Security makes it easy to deploy interoperable layers of defense that span the entire threat lifecycle from pre-delivery staging to post-delivery via an integrated solution that automates phish reporting, triage, and remediation.
Fortra’s Tyler Reguly was recently featured on the Adopting Zero Trust podcast, where he delved into the critical role of vulnerability management within a Zero Trust framework.
Theo Zafirakos recently spoke with The SupplyChainBrain Podcast to address third-party risk management, detail incident response plans and answer the question everyone is asking: Is artificial intelligence the answer to, or bane of, supply chain cybersecurity?
Many of the world's largest companies rely on IBM i operating on IBM Power Servers as their strategic platform for business-critical activities such as retail, distribution, logistics, banking, manufacturing planning, healthcare, insurance, hospitality management, government administration, and legal case management. Given the widespread use of the IBM i operating system, advanced cybersecurity...
Discover the advantages and disadvantages of open-source IT tools and how Halcyon's offerings for Linux, Windows, AIX, and IBM i multi-platform environments compares.
Supply chain cyberattacks can trigger widespread disruptions, impacting multiple business functions and areas with compounded, cascading effects. In this article in Supply Chain Digital, Theo Zafirakos outlines strategies companies can put in place to guard against supply chain attacks.
Cary Hudgins and Mike Jones recently joined the IT Security Wire podcast to dive into the vital role of email protection in business resilience. Since emails are often the first target for cyberattacks, they discussed cutting-edge solutions and emphasized the need for integrating robust email security with your operating platforms.
Session DetailsSecurity leaders of financial institutions have some of the most demanding job descriptions in the industry. Threat actors go where the money goes, and let’s just say that a certain industry has a giant sign hanging above it.As teams try to crack down on enterprise security, cybercriminals continue to attack on multiple fronts. With the complexity of the financial sector increasing...
You don’t know you’ve experienced a ransomware attack until you’ve been delivered the note. Understanding more about the ransomware process can help you stop the attack in the act before it escalates that far.
Cybersecurity experts offer insights into safeguarding digital assets and protection strategies. Explore the emerging role of AI in enhancing cybersecurity efforts.
Supply chain attacks disrupt not only the targeted company but also the entire logistical and distribution network, posing significant challenges and costs. Theo Zafirakos addresses how companies should respond to the rise in these attacks on Manufacturing Business Technology's Security Breach Podcast.