Vulnerability: Page 18


  • An IBM sign stands outside an IBM building in downtown Chicago, Illinois.
    Image attribution tooltip
    Tim Boyle / Staff via Getty Images
    Image attribution tooltip

    IBM file transfer service under active exploit, security researchers warn

    Ransomware groups are still exploiting a vulnerability in unpatched versions of Aspera Faspex almost four months after IBM issued a patch.

    By March 31, 2023
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Outlook zero-day still vulnerable to attackers with prior access, researchers find

    Days after Microsoft issued a patch, researchers demonstrated that threat actors could still bypass the mitigation steps from within a network.

    By March 20, 2023
  • Smiling businesswoman in headphones taking notes, working with laptop and talking smartphone, blue glowing information protection icons. Padlock, cloud and digital interface. Cyber security concept - stock photo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Zero-days fell by one-third in 2022, Mandiant says

    Zero-day vulnerabilities in security, IT and network management products, which are consistently connected to the internet, claimed nearly 1 in 5 exploits.

    By March 20, 2023
  • The red lock and its structure explode in a digital computer setting.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Outlook zero day linked to critical infrastructure attacks

    State-linked actors have targeted oil and gas, transportation and defense industries in Europe.

    By March 16, 2023
  • Futuristic electronic semiconductor and telecommunication network concept
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA launches ransomware warning pilot for critical infrastructure providers

    The agency already warned dozens of organizations about ProxyNotShell.

    By March 14, 2023
  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    GitHub to begin rollout of 2FA security upgrade for developers

    The enhancement is part of a wider series of security measures following a series of malicious cyberattacks.

    By March 9, 2023
  • Bank sign on glass wall of business center
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cloud skills gap raises cyber concerns for banks

    As financial sector companies push forward with modernization, difficulty sourcing talent looms as a potential security risk.

    By Matt Ashare • March 7, 2023
  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard. Screens Show Coding Language User Interface.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Organizations tempt risk as they deploy code more frequently

    An imbalance between developers and security professionals on staff spotlights a disconnect between these business functions and objectives.

    By March 7, 2023
  • General Motors connected vehicle animation
    Image attribution tooltip
    Permission granted by General Motors
    Image attribution tooltip

    Who is liable for flawed software? New guidance upends the security standard

    Development practices and safe harbor provisions are the subject of major debate as work to implement the White Houses’ cyber strategy begins.

    By March 6, 2023
  • A long curved desk with banks of computer monitors mounted on the wall.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    An ongoing SOC skills shortage could spell trouble for compliance

    Without skilled analysts to monitor the SOC, the risk of a successful cyberattack breaking through a company’s defenses grows. 

    By Sue Poremba • March 1, 2023
  • A photo illustration of LastPass logos on a hard drive disk held in someone's hand.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    LastPass compromise grew worse after DevOps engineer targeted for encryption key

    A threat actor used data from multiple breaches and a vulnerability on a high-level employee’s home computer to steal customer passwords.

    By Feb. 28, 2023
  • CISA Director Jen Easterly speaking at RSA Conference 2022
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Google backs federal push for tech to embrace ‘secure by design’

    CISA has urged the technology industry to develop more resilient products before they reach customers.

    By Feb. 15, 2023
  • Technician services a cloud server.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    What’s known about the ESXiArgs ransomware hitting VMware servers

    An initial strain affected thousands of devices before a new variant emerged. The latest burst of attacks hit Saturday.

    By Feb. 15, 2023
  • Digital technology vector background depicting a cyberattack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    VMware ransomware was on the rise leading up to ESXiArgs spree, research finds

    Recorded Future analysis underscores a growing ransomware threat confronting organizations using VMware ESXi.

    By Feb. 13, 2023
  • Double exposure shot of backside of a computer and red binary codes.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    VMware ransomware evolves to evade data recovery, reinfects servers

    The new ESXiArgs strain has reinfected more than 1,150 VMware servers and represents more than 4 in 5 live infections, according to open-source ransomware data.

    By Feb. 10, 2023
  • Smiling businesswoman in headphones taking notes, working with laptop and talking smartphone, blue glowing information protection icons. Padlock, cloud and digital interface. Cyber security concept - stock photo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Unsophisticated ransomware campaign targeting VMware ripe for copycats

    Ransomware doesn’t typically hit thousands of potential victims at once. “All of it’s very strange,” one security researcher said.

    By Feb. 8, 2023
  • Person in hat surrounded by cameras at a press conference
    Image attribution tooltip

    Ross D. Franklin/AP

    Image attribution tooltip

    Sports betting apps fumble open source, placing users at risk

    On the cusp of Super Bowl 57, researchers from Synopsys warned popular mobile betting apps face a higher than average risk of being hacked.

    By Feb. 7, 2023
  • Ransomware spelled out in a creative depiction.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ransomware attack spree hits thousands of VMware servers

    Cyber authorities linked the attacks, dubbed ESXiArgs, to a two-year-old VMware vulnerability. At least 2,250 machines have been compromised.

    By Feb. 6, 2023
  • Young Woman Writing Code on Desktop Computer in Stylish Loft Apartment in the Evening.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CVEs expected to rise in 2023, as organizations still struggle to patch

    Most CVEs are exploited within 30 days of public disclosure, a Coalition report found, spelling trouble for organizations trying to shore up their defenses.

    By Feb. 3, 2023
  • Image attribution tooltip
    Scott Olson via Getty Images
    Image attribution tooltip

    Industrial organizations may worry too much about ICS vulnerabilities

    The pressure to constantly patch is more likely to damage industrial plants, Dragos CEO Robert M. Lee said.

    By Jan. 27, 2023
  • The red lock and its structure explode in a digital computer setting.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Exchange Server under pressure as opportunistic actors step up attacks

    Bitdefender Labs warns threat actors are using the ProxyNotShell/OWASSRF exploit chains to launch attacks.

    By Jan. 25, 2023
  • Two technologists stand in front of IT infrastructure.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Almost half of critical manufacturing organizations face significant risk of data breach

    A report presented at the World Economic Forum shows key sectors are under pressure from rising vulnerabilities and a slower rate of patching.

    By Jan. 23, 2023
  • IT technician working on cloud data server.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Four Microsoft Azure services found vulnerable to server-side request forgery

    Researchers from Orca Security said no authentication was required in two of the four instances.

    By Jan. 17, 2023
  • Picture of a cybersecurity lock
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Citrix flaw exploited in ransomware attack against small US business

    Threat actors linked to ransomware group Royal are actively exploiting a vulnerability in two Citrix products, researchers found.

    By Jan. 13, 2023
  • Computer language script and coding on screen.
    Image attribution tooltip
    themotioncloud via Getty Images
    Image attribution tooltip

    Open-source repository risk amplified on GitHub

    Inconsistent or delayed code commits create risk as repositories age, Veracode research found.

    By Jan. 12, 2023