Vulnerability: Page 17


  • Futuristic electronic semiconductor and telecommunication network concept
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA launches ransomware warning pilot for critical infrastructure providers

    The agency already warned dozens of organizations about ProxyNotShell.

    By March 14, 2023
  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    GitHub to begin rollout of 2FA security upgrade for developers

    The enhancement is part of a wider series of security measures following a series of malicious cyberattacks.

    By March 9, 2023
  • Bank sign on glass wall of business center
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cloud skills gap raises cyber concerns for banks

    As financial sector companies push forward with modernization, difficulty sourcing talent looms as a potential security risk.

    By Matt Ashare • March 7, 2023
  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard. Screens Show Coding Language User Interface.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Organizations tempt risk as they deploy code more frequently

    An imbalance between developers and security professionals on staff spotlights a disconnect between these business functions and objectives.

    By March 7, 2023
  • General Motors connected vehicle animation
    Image attribution tooltip
    Permission granted by General Motors
    Image attribution tooltip

    Who is liable for flawed software? New guidance upends the security standard

    Development practices and safe harbor provisions are the subject of major debate as work to implement the White Houses’ cyber strategy begins.

    By March 6, 2023
  • A long curved desk with banks of computer monitors mounted on the wall.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    An ongoing SOC skills shortage could spell trouble for compliance

    Without skilled analysts to monitor the SOC, the risk of a successful cyberattack breaking through a company’s defenses grows. 

    By Sue Poremba • March 1, 2023
  • A photo illustration of LastPass logos on a hard drive disk held in someone's hand.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    LastPass compromise grew worse after DevOps engineer targeted for encryption key

    A threat actor used data from multiple breaches and a vulnerability on a high-level employee’s home computer to steal customer passwords.

    By Feb. 28, 2023
  • CISA Director Jen Easterly, RSA Conference 2022
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Google backs federal push for tech to embrace ‘secure by design’

    CISA has urged the technology industry to develop more resilient products before they reach customers.

    By Feb. 15, 2023
  • Technician services a cloud server.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    What’s known about the ESXiArgs ransomware hitting VMware servers

    An initial strain affected thousands of devices before a new variant emerged. The latest burst of attacks hit Saturday.

    By Feb. 15, 2023
  • Digital technology vector background depicting a cyberattack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    VMware ransomware was on the rise leading up to ESXiArgs spree, research finds

    Recorded Future analysis underscores a growing ransomware threat confronting organizations using VMware ESXi.

    By Feb. 13, 2023
  • Double exposure shot of backside of a computer and red binary codes.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    VMware ransomware evolves to evade data recovery, reinfects servers

    The new ESXiArgs strain has reinfected more than 1,150 VMware servers and represents more than 4 in 5 live infections, according to open-source ransomware data.

    By Feb. 10, 2023
  • Smiling businesswoman in headphones taking notes, working with laptop and talking smartphone, blue glowing information protection icons. Padlock, cloud and digital interface. Cyber security concept - stock photo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Unsophisticated ransomware campaign targeting VMware ripe for copycats

    Ransomware doesn’t typically hit thousands of potential victims at once. “All of it’s very strange,” one security researcher said.

    By Feb. 8, 2023
  • Person in hat surrounded by cameras at a press conference
    Image attribution tooltip

    Ross D. Franklin/AP

    Image attribution tooltip

    Sports betting apps fumble open source, placing users at risk

    On the cusp of Super Bowl 57, researchers from Synopsys warned popular mobile betting apps face a higher than average risk of being hacked.

    By Feb. 7, 2023
  • Ransomware spelled out in a creative depiction.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ransomware attack spree hits thousands of VMware servers

    Cyber authorities linked the attacks, dubbed ESXiArgs, to a two-year-old VMware vulnerability. At least 2,250 machines have been compromised.

    By Feb. 6, 2023
  • Young Woman Writing Code on Desktop Computer in Stylish Loft Apartment in the Evening.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CVEs expected to rise in 2023, as organizations still struggle to patch

    Most CVEs are exploited within 30 days of public disclosure, a Coalition report found, spelling trouble for organizations trying to shore up their defenses.

    By Feb. 3, 2023
  • Image attribution tooltip
    Scott Olson via Getty Images
    Image attribution tooltip

    Industrial organizations may worry too much about ICS vulnerabilities

    The pressure to constantly patch is more likely to damage industrial plants, Dragos CEO Robert M. Lee said.

    By Jan. 27, 2023
  • The red lock and its structure explode in a digital computer setting.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Exchange Server under pressure as opportunistic actors step up attacks

    Bitdefender Labs warns threat actors are using the ProxyNotShell/OWASSRF exploit chains to launch attacks.

    By Jan. 25, 2023
  • Two technologists stand in front of IT infrastructure.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Almost half of critical manufacturing organizations face significant risk of data breach

    A report presented at the World Economic Forum shows key sectors are under pressure from rising vulnerabilities and a slower rate of patching.

    By Jan. 23, 2023
  • IT technician working on cloud data server.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Four Microsoft Azure services found vulnerable to server-side request forgery

    Researchers from Orca Security said no authentication was required in two of the four instances.

    By Jan. 17, 2023
  • Picture of a cybersecurity lock
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Citrix flaw exploited in ransomware attack against small US business

    Threat actors linked to ransomware group Royal are actively exploiting a vulnerability in two Citrix products, researchers found.

    By Jan. 13, 2023
  • Computer language script and coding on screen.
    Image attribution tooltip
    themotioncloud via Getty Images
    Image attribution tooltip

    Open-source repository risk amplified on GitHub

    Inconsistent or delayed code commits create risk as repositories age, Veracode research found.

    By Jan. 12, 2023
  • Digital code data numbers and secure lock icons on hacker's hands working with keyboard computer on dark blue tone background.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA adds Exchange Server, Windows vulnerabilities to catalog of exploited CVEs

    The Exchange Server vulnerability was linked to a December ransomware attack against Rackspace.

    By Jan. 11, 2023
  • Smiling businesswoman in headphones taking notes, working with laptop and talking smartphone, blue glowing information protection icons. Padlock, cloud and digital interface. Cyber security concept - stock photo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Rackspace confirms ransomware attack hit a small percentage of its Hosted Exchange customers

    The cloud services firm said an investigation found no evidence the attackers read, misused or disseminated customer data or emails.

    By Jan. 6, 2023
  • Workers at a security operations center at Rackspace.
    Image attribution tooltip
    Courtesy of Rackspace Technology
    Image attribution tooltip

    Rackspace identifies ransomware threat actor behind December attack via Exchange

    CrowdStrike previously connected Play, the threat actor, to a new Outlook Web Access exploit method used in multiple attacks. 

    By Jan. 3, 2023
  • Lights in Europe are seen from space.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cybersecurity trends in 2023 that will directly impact everyday life

    The scale of cyberthreats are growing, spilling into the mainstream. In 2023, expect the spotlight to add pressure to businesses that have underinvested in security. 

    By Sue Poremba • Jan. 3, 2023