Vulnerability: Page 11


  • Grunge flags illustration of three countries with conflict and political problems (cracked concrete background) | USA, China and Russia
    Image attribution tooltip
    Barks_japan via Getty Images
    Image attribution tooltip

    FBI-led operation disrupts botnet controlled by state-linked Forest Blizzard

    Russia’s GRU-backed group exploited hundreds of vulnerable routers to conduct spear phishing and credential harvesting attacks against U.S. targets.

    By Feb. 16, 2024
  • Rendering of digital data code in safety security technology concept.
    Image attribution tooltip
    iStock/Getty Images Plus via Getty Images
    Image attribution tooltip

    Ivanti Connect Secure threat activity continues as researchers flag additional flaws

    The company revised a recent vulnerability disclosure after failing to credit security firm watchTowr.

    By Feb. 12, 2024
  • Digital cloud and network security. 3D computer hardware illustration.
    Image attribution tooltip
    solarseven
    Image attribution tooltip

    Attackers hit more networking gear, this time a critical Fortinet CVE

    The active exploits of Fortinet appliances come during a heightened period of China state-linked malicious activity targeting networking equipment.

    By Feb. 12, 2024
  • Header image for "56% of Business Leaders Are Incorporating AI Into Cybersecurity: Weekly Stat"
    Image attribution tooltip
    Andrew Brookes
    Image attribution tooltip

    JetBrains warns of another critical CVE in on-premises TeamCity servers

    The new vulnerability disclosure comes two months after authorities warned of other TeamCity exploitation activity linked to Midnight Blizzard.

    By Feb. 7, 2024
  • An image of a digital lock is shown
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Ivanti VPNs face renewed threat activity after initial patch release and new CVEs

    After weeks of mitigation efforts, CISA ordered federal civilian agencies to disconnect the devices.

    By Feb. 6, 2024
  • Schneider Electric restores sustainability operations after attack

    The energy management company is still investigating the ransomware attack, which led to the theft of data.

    By Feb. 6, 2024
  • Header image for "43% of Audit Executives Rank Cybersecurity Controls as 2023's Lead Risk"
    Image attribution tooltip
    Colin Anderson Productions pty ltd
    Image attribution tooltip

    Delayed Ivanti patch arrives after weeks of exploitation

    The company also disclosed two additional high-severity vulnerabilities in Ivanti Connect Secure and Ivanti Policy Secure.

    By Jan. 31, 2024
  • Interior of Progress Software's office in Rotterdam, Netherlands.
    Image attribution tooltip
    Retrieved from Progress Software on January 18, 2024
    Image attribution tooltip

    MOVEit liabilities mount for Progress Software

    The company revealed multiple government investigations are underway into the MOVEit vulnerability. It’s also party to more than 100 class-action lawsuits.

    By Jan. 30, 2024
  • IT workers code in office
    Image attribution tooltip
    AnnaStills via Getty Images
    Image attribution tooltip

    AI-generated code leads to security issues for most businesses: report

    More than three-quarters of developers bypass established protocols to use code completion tools despite potential risks, Snyk’s research found. 

    By Lindsey Wilkinson • Jan. 30, 2024
  • Computer language script and coding on screen.
    Image attribution tooltip
    themotioncloud via Getty Images
    Image attribution tooltip

    Popular CI/CD tool Jenkins discloses critical CVE

    The open source automation server software is used by more than 11 million developers globally, according to the project’s supporters.

    By Jan. 29, 2024
  • Alarm clock on nightstand.
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    Ivanti Connect Secure zero-day patches delayed

    Researchers observed attackers attempting to manipulate Ivanti’s internal integrity checker, and the cause for the patch delay remains unclear.

    By Jan. 29, 2024
  • Smiling businesswoman in headphones taking notes, working with laptop and talking smartphone, blue glowing information protection icons. Padlock, cloud and digital interface. Cyber security concept - stock photo
    Image attribution tooltip
    iStock via Getty Images
    Image attribution tooltip

    Nearly 800 GoAnywhere instances are unpatched, exposed to critical CVE

    Although patching lags, the number of hosts with publicly exposed and vulnerable admin interfaces are limited.

    By Jan. 26, 2024
  • A series of yellow folders that depict lines of binary code running between them.
    Image attribution tooltip
    D3Damon via Getty Images
    Image attribution tooltip

    GoAnywhere MFT customers confront yet another critical file-transfer CVE

    File-transfer services, including GoAnywhere, were widely exploited by ransomware threat groups in 2023.

    By Jan. 24, 2024
  • Header image for "43% of Audit Executives Rank Cybersecurity Controls as 2023's Lead Risk"
    Image attribution tooltip
    Colin Anderson Productions pty ltd
    Image attribution tooltip

    Atlassian Confluence Data Center under active exploitation in older versions

    Security researchers warn that attacks are rapidly accelerating in recent days.

    By Jan. 23, 2024
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA issues emergency directive for federal agencies to mitigate Ivanti vulnerabilities

    Civilian agencies are under threat following a surge in nation-state linked exploitation of Ivanti Connect Secure and Ivanti Policy Secure devices.

    By Jan. 19, 2024
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA’s 1,200 pre-ransomware alerts saved organizations millions in damages

    The federal agency’s early warning system notified organizations across multiple critical infrastructure sectors of potential impending attacks.

    By Jan. 19, 2024
  • An image of a digital lock is shown
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Ivanti Connect Secure exploitation accelerates as Moody’s calls impact credit negative

    A suspected state-linked hacker is manipulating an integrity tool used to check systems as customers still await an initial patch.

    By Jan. 19, 2024
  • Exterior of Citrix office complex.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    Citrix warns of limited exploitation in a pair of Netscaler zero days

    The company said the vulnerabilities are unrelated to CitrixBleed, but urged customers to immediately apply fixes to protect their systems.

    By Jan. 18, 2024
  • Interior of Progress Software's office in Rotterdam, Netherlands.
    Image attribution tooltip
    Retrieved from Progress Software on January 18, 2024
    Image attribution tooltip

    Progress Software shakes off MOVEit’s financial consequences, maintains customers

    Executives described the file-transfer service as one of its stronger performing products and said customers remain loyal.

    By Jan. 18, 2024
  • An image of a digital lock is shown
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Ivanti Connect Secure exploitation accelerates, 1,700 devices compromised worldwide

    Researchers warn additional threat actors are actively working to take advantage of two chained together vulnerabilities.

    By Jan. 17, 2024
  • Aerial view of Colorado State University campus.
    Image attribution tooltip
    Retrieved from Colorado State University on January 09, 2024
    Image attribution tooltip
    Deep Dive

    Progress Software’s MOVEit meltdown: uncovering the fallout

    Businesses use the file-transfer service because it checks the compliance boxes for keeping data safe. Though initial attacks were targeted, thousands of bystanding businesses were hit indiscriminately.

    By , Jan. 16, 2024
  • Header image for "43% of Audit Executives Rank Cybersecurity Controls as 2023's Lead Risk"
    Image attribution tooltip
    Colin Anderson Productions pty ltd
    Image attribution tooltip

    Ivanti Connect Secure attacks part of deliberate espionage operation

    Researchers warn the previously unknown actor has developed custom malware designed to maintain persistent access on targeted networks and evade detection.

    By Jan. 12, 2024
  • cybersecurity, talent shortage, retention, leadership
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    Ivanti Connect Secure devices face active exploitation, patch schedule staggered

    Unauthenticated attackers can take control of systems by exploiting the zero days, which a suspected state-linked threat actor is chaining together. 

    By Jan. 11, 2024
  • Threat actor views data file
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    Apache OFBiz critical CVE leads to surge in exploitation attempts

    A patch for a prior vulnerability failed to resolve the root cause of an issue, leading to additional threat activity.

    By Jan. 5, 2024
  • CISA Director Jen Easterly speaks at Carnegie Mellon University urging the tech industry to embrace secure-by-design product development.
    Image attribution tooltip
    Permission granted by Carnegie Mellon University
    Image attribution tooltip

    CISA seeks comment on secure by design principles to boost global software security

    The agency issued an RFI seeking industry input on costs, how to incorporate security into higher education and how to reduce recurring security vulnerabilities.

    By Dec. 21, 2023