Vulnerability: Page 14


  • CFOs play a key role in advocating for preventative cybersecurity actions that help reduce the cost of cyber risks.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    JetBrains TeamCity a ripe attack target as more vulnerabilities emerge

    Despite available security fixes, Rapid7 researchers raised concerns about JetBrains' lack of coordination in vulnerability disclosure.

    By Updated March 6, 2024
  • Double exposure shot of backside of a computer and red binary codes.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    In ConnectWise attacks, Play and LockBit ransomware exploits developed quickly

    The incidents highlight rapid ongoing exploitation by criminal threat actors as customers are urged to patch.

    By March 4, 2024
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ivanti exploit warnings go global as Five Eyes sound alarm

    Ivanti pushed back on some of CISA’s findings, claiming no hacker was able to gain persistence when customers followed recommended mitigations.

    By Updated March 1, 2024
  • A utility worker checks a power line after a tornado.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Utility regulators take steps to raise sector’s cybersecurity ‘baselines’

    The voluntary cyber recommendations are intended to serve as a resource for state public utility commissions, utilities and distribution operators and aggregators.

    By Robert Walton • Feb. 29, 2024
  • Threat actor views data file
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    ConnectWise ScreenConnect critical CVE lures an array of threat actors

    The company is urging all on-premises customers to upgrade to a secure version of the application as different threat groups ramp up exploits. 

    By Feb. 29, 2024
  • National Cyber Director Harry Coker speaks in Washington.
    Image attribution tooltip
    Permission granted by Information Technology Industry Council
    Image attribution tooltip

    White House rallies industry support for memory safe programming

    Major firms, including HPE, SAP and Palantir back administration's push to reduce critical vulnerabilities linked to software development practices.

    By Feb. 28, 2024
  • Digital technology vector background depicting a cyberattack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ivanti Connect Secure hackers hide in plain sight, evading protections

    Mandiant researchers estimate thousands of devices have been exploited, and are urging users to check their systems with a newly updated tool.

    By Updated March 1, 2024
  • Person using multiple devices.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    ConnectWise ScreenConnect faces new attacks involving LockBit ransomware

    A variety of hackers are working to exploit a critical vulnerability in the remote desktop application.

    By Feb. 23, 2024
  • An image of a digital lock is shown
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    ConnectWise ScreenConnect under active exploitation due to critical flaws

    Security researchers are urging users to immediately patch their systems after the company warned of an authentication bypass vulnerability that is considered trivial to exploit.

    By Feb. 22, 2024
  • Drone shot of a massive container ship arriving in the Port of Long Beach, California.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Biden administration issues executive order on port cybersecurity

    The order will transfer crane manufacturing back to the U.S., amid concerns about potential cyber risk to port facilities, maritime transportation and threats from China.

    By Feb. 21, 2024
  • Grunge flags illustration of three countries with conflict and political problems (cracked concrete background) | USA, China and Russia
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    FBI-led operation disrupts botnet controlled by state-linked Forest Blizzard

    Russia’s GRU-backed group exploited hundreds of vulnerable routers to conduct spear phishing and credential harvesting attacks against U.S. targets.

    By Feb. 16, 2024
  • Rendering of digital data code in safety security technology concept.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ivanti Connect Secure threat activity continues as researchers flag additional flaws

    The company revised a recent vulnerability disclosure after failing to credit security firm watchTowr.

    By Feb. 12, 2024
  • Digital cloud and network security. 3D computer hardware illustration.
    Image attribution tooltip
    solarseven
    Image attribution tooltip

    Attackers hit more networking gear, this time a critical Fortinet CVE

    The active exploits of Fortinet appliances come during a heightened period of China state-linked malicious activity targeting networking equipment.

    By Feb. 12, 2024
  • Header image for "56% of Business Leaders Are Incorporating AI Into Cybersecurity: Weekly Stat"
    Image attribution tooltip
    Andrew Brookes
    Image attribution tooltip

    JetBrains warns of another critical CVE in on-premises TeamCity servers

    The new vulnerability disclosure comes two months after authorities warned of other TeamCity exploitation activity linked to Midnight Blizzard.

    By Feb. 7, 2024
  • An image of a digital lock is shown
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ivanti VPNs face renewed threat activity after initial patch release and new CVEs

    After weeks of mitigation efforts, CISA ordered federal civilian agencies to disconnect the devices.

    By Feb. 6, 2024
  • Schneider Electric restores sustainability operations after attack

    The energy management company is still investigating the ransomware attack, which led to the theft of data.

    By Feb. 6, 2024
  • Header image for "43% of Audit Executives Rank Cybersecurity Controls as 2023's Lead Risk"
    Image attribution tooltip
    Colin Anderson Productions pty ltd
    Image attribution tooltip

    Delayed Ivanti patch arrives after weeks of exploitation

    The company also disclosed two additional high-severity vulnerabilities in Ivanti Connect Secure and Ivanti Policy Secure.

    By Jan. 31, 2024
  • Interior of Progress Software's office in Rotterdam, Netherlands.
    Image attribution tooltip
    Retrieved from Progress Software on January 18, 2024
    Image attribution tooltip

    MOVEit liabilities mount for Progress Software

    The company revealed multiple government investigations are underway into the MOVEit vulnerability. It’s also party to more than 100 class-action lawsuits.

    By Jan. 30, 2024
  • IT workers code in office
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI-generated code leads to security issues for most businesses: report

    More than three-quarters of developers bypass established protocols to use code completion tools despite potential risks, Snyk’s research found. 

    By Lindsey Wilkinson • Jan. 30, 2024
  • Computer language script and coding on screen.
    Image attribution tooltip
    themotioncloud via Getty Images
    Image attribution tooltip

    Popular CI/CD tool Jenkins discloses critical CVE

    The open source automation server software is used by more than 11 million developers globally, according to the project’s supporters.

    By Jan. 29, 2024
  • Alarm clock on nightstand.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ivanti Connect Secure zero-day patches delayed

    Researchers observed attackers attempting to manipulate Ivanti’s internal integrity checker, and the cause for the patch delay remains unclear.

    By Jan. 29, 2024
  • Smiling businesswoman in headphones taking notes, working with laptop and talking smartphone, blue glowing information protection icons. Padlock, cloud and digital interface. Cyber security concept - stock photo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Nearly 800 GoAnywhere instances are unpatched, exposed to critical CVE

    Although patching lags, the number of hosts with publicly exposed and vulnerable admin interfaces are limited.

    By Jan. 26, 2024
  • A series of yellow folders that depict lines of binary code running between them.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    GoAnywhere MFT customers confront yet another critical file-transfer CVE

    File-transfer services, including GoAnywhere, were widely exploited by ransomware threat groups in 2023.

    By Jan. 24, 2024
  • Header image for "43% of Audit Executives Rank Cybersecurity Controls as 2023's Lead Risk"
    Image attribution tooltip
    Colin Anderson Productions pty ltd
    Image attribution tooltip

    Atlassian Confluence Data Center under active exploitation in older versions

    Security researchers warn that attacks are rapidly accelerating in recent days.

    By Jan. 23, 2024
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA issues emergency directive for federal agencies to mitigate Ivanti vulnerabilities

    Civilian agencies are under threat following a surge in nation-state linked exploitation of Ivanti Connect Secure and Ivanti Policy Secure devices.

    By Jan. 19, 2024