Vulnerability: Page 17


  • An aerial view of Washington, D.C. that includes the Washington Monument.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    US puts $10M bounty on Clop as federal agencies confirm data compromises

    Additional private sector companies have disclosed attacks after multiple vulnerabilities were found in MOVEit Transfer software.

    By June 20, 2023
  • The U.S. Capitol Building at night with lightning in the background.
    Image attribution tooltip
    Naomi Eide/Cybersecurity Dive
    Image attribution tooltip

    Another MOVEit vulnerability found, as state and federal agencies reveal breaches

    The third vulnerability since Progress Software first disclosed a MOVEit Transfer zero day arrived just as CISA officials said a “small number” of federal agencies were impacted. 

    By Naomi Eide • June 16, 2023
  • The red lock and its structure explode in a digital computer setting.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Clop names a dozen MOVEit victims, but holds back details

    As its deadline expired, the ransomware group released the first batch of victim organizations, most of which were U.S.-based, ReliaQuest found.

    By Naomi Eide • June 15, 2023
  • Swarm of barracuda
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Barracuda ESG devices actively exploited in broad, ongoing espionage campaign

    The campaign is the broadest by a China-nexus actor since the mass exploitation of Microsoft Exchange in 2021, Mandiant researchers said.

    By Updated June 15, 2023
  • Ransomware virus has encrypted data. Attacker is offering key to unlock encrypted data for money.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    MOVEit customers on high alert as Clop’s deadline expires

    As more compromised organizations come forward, one risk analysis firm is pushing the timeline for the vulnerability back years.

    By June 14, 2023
  • Military Surveillance Officer Working on a City Tracking Operation in a Central Office Hub for Cyber Control and Monitoring for Managing National Security, Technology and Army Communications.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Fortinet urges firmware upgrades after critical vulnerability at risk of malicious attacks

    The warning comes just weeks after the company was linked to the Volt Typhoon campaign against U.S. critical infrastructure targets.

    By June 13, 2023
  • a swarm of barracudas
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Barracuda urges customers to replace compromised ESG appliances immediately

    The retirement of all compromised ESG appliances is akin to an admission the company could not remove threat actor access and recover the devices for customers.

    By June 9, 2023
  • exclamation point depicted hovering above network infrastructure
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Clop claims hundreds of MOVEit vulnerability victims

    The prolific threat actor is responsible for two of the three high-profile, actively exploited vulnerabilities in file-transfer services so far this year.

    By June 8, 2023
  • Digital technology vector background depicting a cyberattack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    What we know about the MOVEit vulnerabilities and compromises

    Active exploits already resulted in a follow-on attack that’s impacted multiple organizations. Threat hunters are on guard and anticipate more victims.

    By Updated June 12, 2023
  • Rendered image depicting global networks.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Worries mount for MOVEit vulnerability, as likelihood of compromise expands

    MOVEit has customers across highly regulated industries, exemplifying the potential damage among government, finance and healthcare organizations.

    By June 5, 2023
  • Exclamation mark depicted over code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    MOVEit zero-day vulnerability under active exploit, data already stolen

    Mandiant found evidence of attacks over Memorial Day weekend and said it’s possible earlier instances of exploitation may still be uncovered.

    By June 1, 2023
  • Swarm of barracuda
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Barracuda zero-day vulnerability exploited for 7 months before detection

    The latest disclosure increases the potential for widespread compromise for customers using the security vendor’s email security gateway appliances.

    By May 31, 2023
  • Gas turbine electric power plant in blue hour.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Moody’s cites credit risk from state-backed cyber intrusions into US critical infrastructure

    Key sectors could face short-term revenue impacts and long-term reputational harm and litigation risk, the credit ratings service said.

    By May 31, 2023
  • a swarm of barracudas
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Barracuda patches actively exploited zero-day vulnerability in email gateways

    The security vendor declined to answer questions about how many customers were impacted and what, if any, customer data was compromised.

    By May 25, 2023
  • A password field reflected on a eye.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    KeePass master password manager at risk as users await patch

    The exploit only works if the master password is typed directly into KeePass. However, a patch won’t be available for weeks.

    By May 23, 2023
  • VMware booth at RSA Conference on April 27, 2023 in San Francisco.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    VMware’s ‘target-rich environment’ is growing more volatile, CrowdStrike warns

    Ransomware groups continue to target VMware because they know the virtualization infrastructure is vulnerable and lacks security tools, threat researchers said.

    By May 16, 2023
  • A stylized stock chart is superimposed over a picture of U.S. dollars.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Costs of software supply chain attacks could exceed $46B this year

    Losses attributed to software supply chain attacks will jump 76%, reaching almost $81 billion by 2026, according to Juniper Research.

    By May 12, 2023
  • Professional using a printer in a high-rise office building.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    PaperCut actively exploited by multiple threat actors, targeting education sector

    Education is a key market for the print management software, which threat actors have targeted since mid-April. 

    By May 12, 2023
  • Image attribution tooltip
    Michael M. Santiago via Getty Images via Getty Images
    Image attribution tooltip
    Opinion

    Is cybersecurity doing enough to prevent the next Colonial Pipeline attack?

    Two years have passed since the Colonial Pipeline incident, but critical infrastructure providers aren’t doing enough to proactively mitigate attacks. 

    By Matthew Parsons, Brian Knudtson and Alex Reid • May 8, 2023
  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Most open source maintainers still consider themselves hobbyists, despite compensation pledges

    A study by Tidelift shows a compensation gap for the key producers of open source applications, raising questions about how to properly secure software supply chains.

    By May 2, 2023
  • ChatGPT on computer screen
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    OpenAI adds more data privacy guardrails for ChatGPT

    The company is allowing users to turn off chat history and export data as it seeks to reach enterprise customers.

    By Lindsey Wilkinson • April 26, 2023
  • Smiling businesswoman in headphones taking notes, working with laptop and talking smartphone, blue glowing information protection icons. Padlock, cloud and digital interface. Cyber security concept - stock photo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    More than 2K organizations at risk of major attacks linked to SLP vulnerability

    Over 54,000 SLP-speaking instances and 670 product types are vulnerable, researchers from BitSight and Curesec found, including VMware ESXi Hypervisor. 

    By April 25, 2023
  • legal processes
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Software industry leaders debate real costs and benefits of CISA security push

    The global effort to promote secure by design is seen as a potential game changer for software security, but may require substantial investments and considerable cultural changes.

    By April 14, 2023
  • CISA Director Jen Easterly talks with CEO George Kurtz during the CrowdStrike Government Summit.
    Image attribution tooltip
    Permission granted by CrowdStrike
    Image attribution tooltip

    CISA to unveil secure-by-design principles this week amid push for software security

    The Biden administration plans to shift responsibility for product safety to the tech industry. Stakeholder discussions are already underway.  

    By April 12, 2023
  • Double exposure shot of backside of a computer and red binary codes.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Palo Alto security software stung by ransomware strain

    Check Point researchers say the “Rorschach” ransomware – found during an attack on a U.S. company – may be the fastest ever seen.

    By April 4, 2023