Vulnerability: Page 18


  • Computer language script and coding on screen.
    Image attribution tooltip
    themotioncloud via Getty Images
    Image attribution tooltip

    Familiar names top 2021's most-exploited vulnerabilities list

    Top ransomware operators, including Hive and Conti, are exploiting flawed systems to launch new attacks, researchers warn.

    By May 2, 2022
  • Computer language script and coding on screen.
    Image attribution tooltip
    themotioncloud via Getty Images
    Image attribution tooltip

    IT leaders remain bullish on open source despite security hiccups

    Enterprise adoption of open source has not cooled, but flaws have highlighted the need for a better understanding of dependencies.

    By Brian Eastwood • April 25, 2022
  • A woman looking at her laptop holding a payment card.
    Image attribution tooltip
    Permission granted by Cybersource
    Image attribution tooltip
    Sponsored by Cybersource/Visa

    Merchants prioritize fraud prevention as fraud costs, impact to businesses rise

    Merchants are grappling with which tools to use, which are most effective and how to balance rising fraud attacks on a limited budget without hampering CX.   

    April 25, 2022
  • Communication network concept. GUI (Graphical User Interface).
    Image attribution tooltip
    metamorworks via Getty Images
    Image attribution tooltip

    AWS reissues Log4Shell hotpatch after vulnerabilities found

    Researchers warn attackers can escape containers and escalate privileges.

    By April 22, 2022
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    Threat detection accelerates in Asia, Europe, as notification trends shift

    Median dwell time fell as organizations boosted cybersecurity defenses, shared threat intelligence.

    By April 19, 2022
  • Cybersecurity experts caution against attacks on automation systems in construction industry
    Image attribution tooltip
    Permission granted by Autodesk
    Image attribution tooltip

    Construction sector mulls cyber risk: hackers toying with materials

    Structural integrity specs in automated systems could become a target. Here's how companies like Trimble, Procore and Autodesk are preparing.

    By Sebastian Obando • March 31, 2022
  • Dozens of lines of computer code on a monitor.
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    Big tech is fixing bugs faster. Will that influence trickle down?

    If a customer lacks urgency in deploying a patch, a flaw can linger. 

    By Sue Poremba • March 25, 2022
  • Image attribution tooltip
    Carsten Koall via Getty Images
    Image attribution tooltip

    Russian state-sponsored actors target PrintNightmare, MFA settings

    ESET researchers are separately warning about new data wiping malware.

    By March 16, 2022
  • Image attribution tooltip
    Michael Loccisano via Getty Images
    Image attribution tooltip

    Education sector more prepared for cyberattacks than most

    An analysis from Immersive Labs shows K-12 and higher ed are more willing to comply with ransomware demands.

    By Kara Arundel • March 11, 2022
  • Image attribution tooltip

    NicoElNino / Canva

    Image attribution tooltip
    Sponsored by Enzoic

    The threat from within: How to address the employee element in password security

    There are numerous sides to the password problem, but here are a few common issues to know.

    March 7, 2022
  • An empty hospital operating theater is prepared with lighting and equipment
    Image attribution tooltip
    JohnnyGreig via Getty Images
    Image attribution tooltip

    Medtech, hospitals on alert for cyberattacks after Russia's invasion of Ukraine

    The Russia-Ukraine conflict has raised the cyberthreat level for medtech and hospitals, putting patient safety at risk.

    By Greg Slabodkin • March 2, 2022
  • Dozens of lines of computer code on a monitor.
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    Critical SAP CVEs leave broad exposure, fixes require downtime

    Thousands of systems remain vulnerable, including applications not connected to the public internet. 

    By Feb. 17, 2022
  • Close up stock photograph of a mature man working with a large computer screen. He’s working with 3D software examining complicated shapes.
    Image attribution tooltip
    Laurence Dutton via Getty Images
    Image attribution tooltip

    Cybersecurity outlook for 2022

    Nation-state cyberthreats and Log4j have the security community on high alert; organizations need to master response and remediation.  

    By Naomi Eide • Feb. 14, 2022
  • Communication network concept. GUI (Graphical User Interface).
    Image attribution tooltip
    metamorworks via Getty Images
    Image attribution tooltip

    Log4j highlights ongoing cyber risk from free, open source software: Moody's

    Limited investment and slow remediation response continues to challenge open source software.

    By Feb. 11, 2022
  • Server room (Sefa Ozel/Getty)
    Image attribution tooltip
    Sefa Ozel/Getty via Getty Images
    Image attribution tooltip

    Critical SAP vulnerabilities spur CISA, researcher pleas for urgent patching

    Onapsis security researchers warn attackers could take full control of systems to steal data, disrupt critical business functions and launch ransomware.

    By Feb. 10, 2022
  • A wide camera angle of the U.S. Capitol in Washington, DC
    Image attribution tooltip
    Stefan Zaklin via Getty Images
    Image attribution tooltip

    Apache tells US Senate committee the Log4j vulnerability could take years to resolve

    While a software bill of materials could improve supply chain security, users still download vulnerable versions of software. 

    By Feb. 9, 2022
  • Laptop
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    NIST targets software supply chain with guidance on security standards

    Guidelines call for developers to attest they use secure software practices.

    By Feb. 7, 2022
  • Image attribution tooltip

    Canva.com

    Image attribution tooltip
    Sponsored by Enzoic

    In 2022, you can no longer afford to ignore credential security

    Credentials are among the most sought-after targets by hackers due to the low risk and high rewards.

    Jan. 31, 2022
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Traitov/iStock/Getty via Getty Images
    Image attribution tooltip

    Blackberry links initial access broker activity to Log4Shell exploit in VMware Horizon

    The threat actor primarily installed cryptomining software onto affected systems. In some cases, however, it deployed Cobalt Strike beacons, Blackberry found.

    By Jan. 26, 2022
  • Image attribution tooltip
    Mario Tama via Getty Images
    Image attribution tooltip

    Log4j raises cyber risk for public finance entities, Fitch warns

    Local agencies and critical sites face increased operational and financial risk as the vulnerability opens organizations to ransomware or other malicious activity. 

    By Jan. 19, 2022
  • Hands type on a laptop keyboard, screen shows a software editor
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    Extracting portions of open source in software development threatens app security

    While companies employ safeguards to detect flaws in applications, the likelihood of organizations running a complete database of all the places a vulnerability lives is slim.

    By Samantha Schwartz • Jan. 19, 2022
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    Cobalt Strike targets VMware Horizon after UK warnings of Log4Shell threats

    Researchers say the threat emulation tool may endanger thousands of vulnerable servers.

    By Jan. 18, 2022
  • Anne Neuberger, deputy national security advisor for cyber and emerging technology, speaks at the White House.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Big tech pushes White House for open source funding, standards after Log4j

    Technology officials are calling on cross-sector collaboration to prevent a recurrence of a Log4j-style security crisis. 

    By Jan. 14, 2022
  • Microsoft signage displayed
    Image attribution tooltip
    Jeenah Moon via Getty Images
    Image attribution tooltip

    Microsoft pushes patch for wormable HTTP vulnerability, exploitation undetected so far

    An attacker does not need to interact with a user or have privileged access to infect a system. 

    By Samantha Schwartz • Jan. 13, 2022
  • Image attribution tooltip
    Kevin Dietsch / Staff via Getty Images
    Image attribution tooltip

    Log4j threat activity limited, but CISA says actors lay in wait

    Microsoft is warning about new activity from a threat actor exploiting the vulnerability in VMware Horizon to deploy ransomware.

    By Jan. 11, 2022