Vulnerability: Page 15


  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA’s 1,200 pre-ransomware alerts saved organizations millions in damages

    The federal agency’s early warning system notified organizations across multiple critical infrastructure sectors of potential impending attacks.

    By Jan. 19, 2024
  • An image of a digital lock is shown
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ivanti Connect Secure exploitation accelerates as Moody’s calls impact credit negative

    A suspected state-linked hacker is manipulating an integrity tool used to check systems as customers still await an initial patch.

    By Jan. 19, 2024
  • Exterior of Citrix office complex.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    Citrix warns of limited exploitation in a pair of Netscaler zero days

    The company said the vulnerabilities are unrelated to CitrixBleed, but urged customers to immediately apply fixes to protect their systems.

    By Jan. 18, 2024
  • Interior of Progress Software's office in Rotterdam, Netherlands.
    Image attribution tooltip
    Retrieved from Progress Software on January 18, 2024
    Image attribution tooltip

    Progress Software shakes off MOVEit’s financial consequences, maintains customers

    Executives described the file-transfer service as one of its stronger performing products and said customers remain loyal.

    By Jan. 18, 2024
  • An image of a digital lock is shown
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ivanti Connect Secure exploitation accelerates, 1,700 devices compromised worldwide

    Researchers warn additional threat actors are actively working to take advantage of two chained together vulnerabilities.

    By Jan. 17, 2024
  • Aerial view of Colorado State University campus.
    Image attribution tooltip
    Retrieved from Colorado State University on January 09, 2024
    Image attribution tooltip
    Deep Dive

    Progress Software’s MOVEit meltdown: uncovering the fallout

    Businesses use the file-transfer service because it checks the compliance boxes for keeping data safe. Though initial attacks were targeted, thousands of bystanding businesses were hit indiscriminately.

    By , Jan. 16, 2024
  • Header image for "43% of Audit Executives Rank Cybersecurity Controls as 2023's Lead Risk"
    Image attribution tooltip
    Colin Anderson Productions pty ltd
    Image attribution tooltip

    Ivanti Connect Secure attacks part of deliberate espionage operation

    Researchers warn the previously unknown actor has developed custom malware designed to maintain persistent access on targeted networks and evade detection.

    By Jan. 12, 2024
  • cybersecurity, talent shortage, retention, leadership
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ivanti Connect Secure devices face active exploitation, patch schedule staggered

    Unauthenticated attackers can take control of systems by exploiting the zero days, which a suspected state-linked threat actor is chaining together. 

    By Jan. 11, 2024
  • Threat actor views data file
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Apache OFBiz critical CVE leads to surge in exploitation attempts

    A patch for a prior vulnerability failed to resolve the root cause of an issue, leading to additional threat activity.

    By Jan. 5, 2024
  • CISA Director Jen Easterly speaks at Carnegie Mellon University urging the tech industry to embrace secure-by-design product development.
    Image attribution tooltip
    Permission granted by Carnegie Mellon University
    Image attribution tooltip

    CISA seeks comment on secure by design principles to boost global software security

    The agency issued an RFI seeking industry input on costs, how to incorporate security into higher education and how to reduce recurring security vulnerabilities.

    By Dec. 21, 2023
  • Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Comcast’s Xfinity discloses massive data breach linked to CitrixBleed vulnerability

    The breach, involving 35.9 million customers, took place just a week after Citrix released a patch for a critical flaw.

    By Dec. 19, 2023
  • Brightly colored digital lock with central computer processor and futuristic circuit board.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    State-linked cyber actors behind SolarWinds plant seeds for new malicious campaign

    U.S. authorities are raising alarms that the 2020 Sunburst attack threat actors are exploiting a CVE in JetBrains TeamCity in preparation for future supply chain compromises.

    By Dec. 15, 2023
  • Exterior of Citrix office complex.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    CitrixBleed isn’t going away: Security experts struggle to control critical vulnerability

    While officials echo urgent mitigation steps to contain the zero-day vulnerability, high-profile organizations continue to bear the impact.

    By Dec. 14, 2023
  • Brightly colored digital lock with central computer processor and futuristic circuit board.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    2 years on, Log4j still haunts the security community

    Research from Veracode shows nearly 2 in 5 applications are still running vulnerable versions. 

    By Dec. 8, 2023
  • Smiling businesswoman in headphones taking notes, working with laptop and talking smartphone, blue glowing information protection icons. Padlock, cloud and digital interface. Cyber security concept - stock photo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Progress Software discloses 2 new CVEs in MOVEit

    The latest set of vulnerabilities in the file-transfer service brings the total number of disclosed CVEs to eight since a zero-day was widely exploited in late May.

    By Dec. 7, 2023
  • CISA Director Jen Easterly speaking at RSA Conference 2022
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    CISA performance goals program trims exploited CVEs

    Organizations enrolled in the agency’s vulnerability scanning program are showing improved security, but the reduction in exploitable internet-facing services is incremental.

    By Dec. 6, 2023
  • An illustration of the front of a bank connected to different icons representing digital services.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Dozens of credit unions confront outages linked to third-party ransomware attack

    CitrixBleed ensnared another industry, leading to a network incident at Ongoing Operations, which provides business continuity services.

    By Dec. 4, 2023
  • Smiling businesswoman in headphones taking notes, working with laptop and talking smartphone, blue glowing information protection icons. Padlock, cloud and digital interface. Cyber security concept - stock photo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Yet again, threat actors exploit a critical file-transfer service CVE

    File-transfer services are prime targets and vulnerabilities in the open source ownCloud mark the latest in a series of critical services under attack.

    By Updated Dec. 1, 2023
  • Exterior of Citrix office complex.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    CitrixBleed worries mount as nation state, criminal groups launch exploits

    LockBit 3.0 affiliates targeted a unit of Boeing and federal authorities have alerted almost 300 organizations they are vulnerable to attack.

    By Nov. 22, 2023
  • Juniper bush.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    5 Juniper CVEs actively exploited in the wild

    The vendor warned the Junos OS vulnerabilities can be chained to remotely execute code.

    By Nov. 15, 2023
  • A series of yellow folders that depict lines of binary code running between them.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    File-transfer services, rich with sensitive data, are under attack

    A trio of supply-chain attacks in 2023 created turmoil for thousands of corporate victims and their customers.

    By Nov. 14, 2023
  • Exterior of Citrix office complex.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    CitrixBleed sparks race to patch, hunt for malicious activity

    CISA urged organizations to patch, mitigate and report any positive findings as Citrix NetScaler ADC and NetScaler Gateway users remain exposed to session hijack.

    By Nov. 8, 2023
  • Image of Atlassian offices
    Image attribution tooltip
    Courtesy of Atlassian
    Image attribution tooltip

    Atlassian Confluence customers confront pair of critical vulnerabilities

    Back-to-back vulnerabilities in the enterprise content collaboration and management workspace remain under active attack by threat actors.

    By Nov. 7, 2023
  • Female IT Server Specialist Standing in Data Center. View from Rack Server Cabinet with Cloud Server User Interface Icons and Visualization in the Foreground.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA targets software identification in push to boost supply chain security

    The plan is part of a wider effort to boost software security using vulnerability management and SBOMs.

    By Oct. 27, 2023
  • Businessman looking at city through office window
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Citrix urges NetScaler ADC, Gateway customers to patch

    The company warned of session hijacking and targeted attacks against a critical vulnerability.

    By Oct. 24, 2023