Vulnerability: Page 19


  • Programming scripts on laptop monitor, unauthorized remote hacking of server
    Image attribution tooltip
    Motortion via Getty Images
    Image attribution tooltip

    Threat actors deploy new attack methods as Microsoft Follina vulnerability lingers

    Researchers discover new vectors, including the use of remote access trojan AsyncRAT.

    By June 10, 2022
  • cybersecurity stock photo
    Image attribution tooltip
    Yudram_TA via Getty Images
    Image attribution tooltip

    FBI, CISA issue warning on China-backed cyber threats against the telecom industry

    State-sponsored actors are targeting small and home office networking equipment for access.

    By June 8, 2022
  • Server room (Sefa Ozel/Getty)
    Image attribution tooltip
    Sefa Ozel/Getty via Getty Images
    Image attribution tooltip

    Attackers aim for Atlassian Confluence zero day with mass, targeted exploitation

    The threat activity comes days after Atlassian released a security fix for the on-premise vulnerability.

    By June 7, 2022
  • A large hallway with supercomputers inside a server room data center.
    Image attribution tooltip
    luza studios via Getty Images
    Image attribution tooltip

    Atlassian releases fix for critical zero day impacting Confluence

    Attackers could take control of affected devices without need for authentication.

    By June 3, 2022
  • cybersecurity stock photo
    Image attribution tooltip
    Yudram_TA via Getty Images
    Image attribution tooltip

    CISA issues warning after critical zero day hits Atlassian's Confluence

    No patch or workaround is currently available and federal agencies are required to disconnect from the product.

    By June 3, 2022
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Food supplier cyber risk spreads 1 year after JBS attack

    Ransomware attacks target common vulnerabilities like legacy OT systems and equipment that lacks modern security tools.

    By June 2, 2022
  • close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept - stock photo
    Image attribution tooltip
    Chainarong Prasertthai via Getty Images
    Image attribution tooltip

    Microsoft zero day under attack as industry awaits patch

    One threat actor has been exploiting the Follina vulnerability to deliver malware, Proofpoint researchers said Tuesday.

    By Updated June 8, 2022
  • A group of co-workers surround a computer screen
    Image attribution tooltip
    Yuri Arcurs via Getty Images
    Image attribution tooltip

    Microsoft Office zero day leaves researchers scrambling over the holiday weekend

    The company warns a successful attack could allow an attacker to install programs, delete data or create new accounts. 

    By Updated May 31, 2022
  • Futuristic city VR wire frame with group of people. This is entirely 3D generated image.
    Image attribution tooltip
    gremlin via Getty Images
    Image attribution tooltip

    Persistent vulnerabilities put VMware on the defense

    Recent flaws earned the company CISA's 10th emergency directive, the latest in a series of potential high-impact flaws for enterprise users.

    By May 27, 2022
  • close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept - stock photo
    Image attribution tooltip
    Chainarong Prasertthai via Getty Images
    Image attribution tooltip

    Feds release grim reminder: Threat actors prey on basic security mishaps

    Federal authorities and U.S. allies admonished companies to tighten weak controls and configurations.

    By May 20, 2022
  • A large hallway with supercomputers inside a server room data center.
    Image attribution tooltip
    luza studios via Getty Images
    Image attribution tooltip

    Critical VMware vulnerabilities resurface after threat actors evade patches within 48 hours

    Even with new patches available, CISA is concerned that threat actors will easily shake off the fixes once again.

    By Updated June 2, 2022
  • Aerial view of the city of Washington DC including the Capitol, the Washington Monument, the National Mall and the Lincoln Memorial at the blue hour
    Image attribution tooltip
    Amy Sparwasser/ iStock via Getty Images
    Image attribution tooltip

    Tech giants pledge multimillion down payment to secure open source

    Top technology companies offered $30 million toward a two-year goal to bolster software supply chain security.

    By May 13, 2022
  • Image depicts the implementation of cybersecurity with a lock displayed over a screen.
    Image attribution tooltip
    anyaberkut via Getty Images
    Image attribution tooltip

    Critical CVEs put Aruba Networks, Avaya enterprise switches at risk

    Researchers previously found similar vulnerabilities in Smart-UPS devices.

    By May 3, 2022
  • Computer language script and coding on screen.
    Image attribution tooltip
    themotioncloud via Getty Images
    Image attribution tooltip

    Familiar names top 2021's most-exploited vulnerabilities list

    Top ransomware operators, including Hive and Conti, are exploiting flawed systems to launch new attacks, researchers warn.

    By May 2, 2022
  • Computer language script and coding on screen.
    Image attribution tooltip
    themotioncloud via Getty Images
    Image attribution tooltip

    IT leaders remain bullish on open source despite security hiccups

    Enterprise adoption of open source has not cooled, but flaws have highlighted the need for a better understanding of dependencies.

    By Brian Eastwood • April 25, 2022
  • A woman looking at her laptop holding a payment card.
    Image attribution tooltip
    Permission granted by Cybersource
    Image attribution tooltip
    Sponsored by Cybersource/Visa

    Merchants prioritize fraud prevention as fraud costs, impact to businesses rise

    Merchants are grappling with which tools to use, which are most effective and how to balance rising fraud attacks on a limited budget without hampering CX.   

    April 25, 2022
  • Communication network concept. GUI (Graphical User Interface).
    Image attribution tooltip
    metamorworks via Getty Images
    Image attribution tooltip

    AWS reissues Log4Shell hotpatch after vulnerabilities found

    Researchers warn attackers can escape containers and escalate privileges.

    By April 22, 2022
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    Threat detection accelerates in Asia, Europe, as notification trends shift

    Median dwell time fell as organizations boosted cybersecurity defenses, shared threat intelligence.

    By April 19, 2022
  • Cybersecurity experts caution against attacks on automation systems in construction industry
    Image attribution tooltip
    Permission granted by Autodesk
    Image attribution tooltip

    Construction sector mulls cyber risk: hackers toying with materials

    Structural integrity specs in automated systems could become a target. Here's how companies like Trimble, Procore and Autodesk are preparing.

    By Sebastian Obando • March 31, 2022
  • Dozens of lines of computer code on a monitor.
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    Big tech is fixing bugs faster. Will that influence trickle down?

    If a customer lacks urgency in deploying a patch, a flaw can linger. 

    By Sue Poremba • March 25, 2022
  • Image attribution tooltip
    Carsten Koall via Getty Images
    Image attribution tooltip

    Russian state-sponsored actors target PrintNightmare, MFA settings

    ESET researchers are separately warning about new data wiping malware.

    By March 16, 2022
  • Image attribution tooltip
    Michael Loccisano via Getty Images
    Image attribution tooltip

    Education sector more prepared for cyberattacks than most

    An analysis from Immersive Labs shows K-12 and higher ed are more willing to comply with ransomware demands.

    By Kara Arundel • March 11, 2022
  • Image attribution tooltip

    NicoElNino / Canva

    Image attribution tooltip
    Sponsored by Enzoic

    The threat from within: How to address the employee element in password security

    There are numerous sides to the password problem, but here are a few common issues to know.

    March 7, 2022
  • An empty hospital operating theater is prepared with lighting and equipment
    Image attribution tooltip
    JohnnyGreig via Getty Images
    Image attribution tooltip

    Medtech, hospitals on alert for cyberattacks after Russia's invasion of Ukraine

    The Russia-Ukraine conflict has raised the cyberthreat level for medtech and hospitals, putting patient safety at risk.

    By Greg Slabodkin • March 2, 2022
  • Dozens of lines of computer code on a monitor.
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    Critical SAP CVEs leave broad exposure, fixes require downtime

    Thousands of systems remain vulnerable, including applications not connected to the public internet. 

    By Feb. 17, 2022