Vulnerability: Page 16


  • IT technician working on cloud data server.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Four Microsoft Azure services found vulnerable to server-side request forgery

    Researchers from Orca Security said no authentication was required in two of the four instances.

    By Jan. 17, 2023
  • Picture of a cybersecurity lock
    Image attribution tooltip
    iStock via Getty Images
    Image attribution tooltip

    Citrix flaw exploited in ransomware attack against small US business

    Threat actors linked to ransomware group Royal are actively exploiting a vulnerability in two Citrix products, researchers found.

    By Jan. 13, 2023
  • Computer language script and coding on screen.
    Image attribution tooltip
    themotioncloud via Getty Images
    Image attribution tooltip

    Open-source repository risk amplified on GitHub

    Inconsistent or delayed code commits create risk as repositories age, Veracode research found.

    By Jan. 12, 2023
  • Digital code data numbers and secure lock icons on hacker's hands working with keyboard computer on dark blue tone background.
    Image attribution tooltip
    Techa Tungateja via Getty Images
    Image attribution tooltip

    CISA adds Exchange Server, Windows vulnerabilities to catalog of exploited CVEs

    The Exchange Server vulnerability was linked to a December ransomware attack against Rackspace.

    By Jan. 11, 2023
  • Smiling businesswoman in headphones taking notes, working with laptop and talking smartphone, blue glowing information protection icons. Padlock, cloud and digital interface. Cyber security concept - stock photo
    Image attribution tooltip
    iStock via Getty Images
    Image attribution tooltip

    Rackspace confirms ransomware attack hit a small percentage of its Hosted Exchange customers

    The cloud services firm said an investigation found no evidence the attackers read, misused or disseminated customer data or emails.

    By Jan. 6, 2023
  • Workers at a security operations center at Rackspace.
    Image attribution tooltip
    Courtesy of Rackspace Technology
    Image attribution tooltip

    Rackspace identifies ransomware threat actor behind December attack via Exchange

    CrowdStrike previously connected Play, the threat actor, to a new Outlook Web Access exploit method used in multiple attacks. 

    By Jan. 3, 2023
  • Lights in Europe are seen from space.
    Image attribution tooltip
    DKosig/iStock via Getty Images
    Image attribution tooltip

    Cybersecurity trends in 2023 that will directly impact everyday life

    The scale of cyberthreats are growing, spilling into the mainstream. In 2023, expect the spotlight to add pressure to businesses that have underinvested in security. 

    By Sue Poremba • Jan. 3, 2023
  • A lit Microsoft log seen above a group of people in shadow.
    Image attribution tooltip
    Jeenah Moon via Getty Images
    Image attribution tooltip

    New exploit for Microsoft’s ProxyNotShell mitigation side steps fix

    CrowdStrike researchers discovered a new attack method by the Play ransomware actors that uses Outlook Web Access and leverages additional tools to maintain access. 

    By Dec. 22, 2022
  • A man checks his phone in an Apple retail store in Grand Central Terminal in New York City.
    Image attribution tooltip
    Drew Angerer/Getty via Getty Images
    Image attribution tooltip

    MacOS vulnerability allows threat actors to bypass Apple Gatekeeper

    Microsoft researchers found a flaw in macOS systems, which can even overcome security features designed to protect high-risk users in Lockdown Mode.

    By Dec. 20, 2022
  • Exterior of Citrix office complex.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    Threat actor exploits critical Citrix vulnerability

    CISA and the NSA quickly issued advisories on the vulnerability, underscoring evidence that a threat actor, active for at least 15 years, is exploiting the flaw.

    By Dec. 13, 2022
  • Military Surveillance Officer Working on a City Tracking Operation in a Central Office Hub for Cyber Control and Monitoring for Managing National Security, Technology and Army Communications.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Fortinet urges customers to upgrade systems amid critical vulnerability

    A heap-based buffer overflow vulnerability has been exploited in the wild and could allow an attacker to gain control of a system.

    By Dec. 13, 2022
  • Picture of a cybersecurity lock
    Image attribution tooltip
    iStock via Getty Images
    Image attribution tooltip

    Fear, panic and Log4j: One year later

    Fears of catastrophic cyberattacks have thus far failed to materialize. But federal authorities stress threat actors are playing the long game.

    By Dec. 9, 2022
  • Microsoft signage displayed
    Image attribution tooltip
    Jeenah Moon via Getty Images
    Image attribution tooltip

    Internet Explorer is still a viable zero-day attack vector

    North Korea-linked threat actors are using a technique that has been widely used to exploit Internet Explorer via Office files since 2017, Google found.

    By Dec. 7, 2022
  • Smiling young family looking at candy and Christmas presents in a store window.
    Image attribution tooltip
    RgStudio via Getty Images
    Image attribution tooltip

    Three-quarters of retail, hospitality applications have security flaws

    Nearly 1 in 5 vulnerabilities in the retail and hospitality industry are considered high severity, Veracode found, creating considerable risks to the organization. 

    By Nov. 22, 2022
  • A depiction of computer hardware.
    Image attribution tooltip
    solarseven via Getty Images
    Image attribution tooltip

    Iran-linked threat actors exploiting Log4Shell via unpatched VMware, feds warn

    The actors compromised a federal civilian agency, CISA and the FBI said. Authorities warned VMware users to assume breach and hunt for threats if they skipped patches or workarounds.

    By Nov. 16, 2022
  • Concept with expert setting up automated software on laptop computer.
    Image attribution tooltip
    NicoElNino via Getty Images
    Image attribution tooltip

    High risk, critical vulnerabilities found in 25% of all software applications and systems

    Research from Synopsys showed weak SSL/TLS configurations were the most prevalent form of vulnerability.

    By Nov. 15, 2022
  • Smiling businesswoman in headphones taking notes, working with laptop and talking smartphone, blue glowing information protection icons. Padlock, cloud and digital interface. Cyber security concept - stock photo
    Image attribution tooltip
    iStock via Getty Images
    Image attribution tooltip

    CISA wants to change how organizations prioritize vulnerabilities

    Federal authorities want to take the guesswork and manual decision making processes out of the messy world of vulnerabilities.

    By Nov. 14, 2022
  • Digital code data numbers and secure lock icons on hacker's hands working with keyboard computer on dark blue tone background.
    Image attribution tooltip
    Techa Tungateja via Getty Images
    Image attribution tooltip

    CISA warns unpatched Zimbra users to assume breach

    Months after warnings to patch the Zimbra Collaboration Suite, government and private sector organizations are under attack from multiple threat actors.

    By Nov. 11, 2022
  • Image depicts the implementation of cybersecurity with a lock displayed over a screen.
    Image attribution tooltip
    anyaberkut via Getty Images
    Image attribution tooltip

    Citrix CVEs need urgent security updates, CISA says

    Though there's no active exploitation yet, Tenable researchers warn they expect threat actors to target the Citrix systems in the near term.

    By Nov. 10, 2022
  • A lit Microsoft log seen above a group of people in shadow.
    Image attribution tooltip
    Jeenah Moon via Getty Images
    Image attribution tooltip

    Microsoft finally releases security updates for ProxyNotShell zero days

    The company linked a limited set of recent Exchange Server attacks to state-backed threat actors.

    By Nov. 8, 2022
  • Picture of a cybersecurity lock
    Image attribution tooltip
    iStock via Getty Images
    Image attribution tooltip

    OpenSSL releases patch for 2 high-severity vulnerabilities after prior warning

    The organization pulled back on earlier warnings of a critical vulnerability, however still urged organizations to apply the upgrades.

    By Nov. 1, 2022
  • Smiling businesswoman in headphones taking notes, working with laptop and talking smartphone, blue glowing information protection icons. Padlock, cloud and digital interface. Cyber security concept - stock photo
    Image attribution tooltip
    iStock via Getty Images
    Image attribution tooltip

    Critical OpenSSL vulnerability causes security industry to hold its breath

    Researchers warn the vulnerability could be the most serious in the industry since 2014's Heartbleed. 

    By Nov. 1, 2022
  • A creative image depicting cybersecurity that includes a lock.
    Image attribution tooltip
    greenbutterfly/iStock/Getty Images Plus via Getty Images
    Image attribution tooltip

    GitHub vulnerability raises risk of open source supply chain attack

    Researchers from Checkmarx said a flaw in the namespace retirement mechanism put thousands of packages at risk of being hijacked by outside threat actors.

    By Oct. 27, 2022
  • Green lights show behind plugged-in cables.
    Image attribution tooltip
    gorodenkoff/iStock via Getty Images
    Image attribution tooltip

    White House plans IoT security labeling program for spring 2023

    Major connected device manufacturers, retailers and industry groups back efforts to boost cyber awareness.

    By Oct. 21, 2022
  • Digital technology vector background depicting a cyberattack.
    Image attribution tooltip
    WhataWin via Getty Images
    Image attribution tooltip

    Apache urges users to upgrade Common Text version to block ‘Text4Shell’ vulnerability

    Any connection to Log4j is misapplied, researchers said, because Log4j is a much more widely used Java library. 

    By Oct. 19, 2022