Vulnerability: Page 19


  • Image attribution tooltip
    Kevin Dietsch / Staff via Getty Images
    Image attribution tooltip

    CISA overhauls vulnerability management, focuses on CVEs under active exploit

    The order is directed at all federal civilian agencies, "however, all organizations should adopt this directive and prioritize mitigating vulnerabilities listed on our public catalog," CISA Director Jen Easterly said.

    By Samantha Schwartz • Nov. 3, 2021
  • Image attribution tooltip
    Bethany Clarke via Getty Images
    Image attribution tooltip

    Twitter eyes phishing deterrence with security key rollout

    The employee multifactor upgrade follows a high-profile attack against celebrity users in 2020, but the social media company says improvements are still needed. 

    By Oct. 29, 2021
  • A woman sitting by her laptop with a clothes rack in the background. SHe is behind a mirror wall.
    Image attribution tooltip

    stock.adobe.com/JacobLund

    Image attribution tooltip
    Sponsored by Cybersource

    How businesses are tackling fraud in a digital-first reality

    With digital transactions and eCommerce continuing to grow in volume, successfully taking on fraud will require businesses to explore and rely on new tools and technologies.

    Oct. 25, 2021
  • Image attribution tooltip
    Patrick Lux via Getty Images
    Image attribution tooltip

    Supply chain attacks lift debate on how to manage software vulnerabilities

    Researchers and developers dispute where responsibilities lie for early detection and how to manage disclosure to customers. The disagreement can allow vulnerabilities to linger. 

    By Oct. 21, 2021
  • Image attribution tooltip
    Carl Court via Getty Images
    Image attribution tooltip

    Users have bad security habits. What can businesses do?

    "As strange as it sounds, in the case of a security incident in the enterprise, you can't blame the user," Bitdefender's Alex "Jay" Balan said. 

    By Samantha Schwartz • Oct. 14, 2021
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Top global companies falling short in protecting domain security

    Major brands leave themselves and their customers open to phishing attacks, ransomware and BEC due to inadequate measures.

    By Oct. 5, 2021
  • Image attribution tooltip
    David Ramos via Getty Images
    Image attribution tooltip

    Threat actors more frequently — and successfully — target Active Directory

    Attacks on AD played a prominent role during the high-profile SolarWinds campaign and LockBit 2.0 ransomware attacks.

    By Sept. 30, 2021
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Traitov/iStock/Getty via Getty Images
    Image attribution tooltip

    Timely patching remains pain point as high-profile bugs linger

    Patches interfering with business productivity are more of a challenge for security teams. 

    By Samantha Schwartz • Sept. 29, 2021
  • software, code, computer
    Image attribution tooltip

    Markus Spiske

    Image attribution tooltip

    How hackers are making the leap from cloud to the software build processes

    The security problem with third-party container applications is not, however, indicative of infrastructure flaws.

    By Samantha Schwartz • Sept. 28, 2021
  • Image attribution tooltip
    Patrick Lux via Getty Images
    Image attribution tooltip

    Is there too much transparency in cybersecurity?

    Between information sharing, software accountability, or incident response and disclosures, companies have to find the disclosure sweet spot.

    By Samantha Schwartz • Sept. 21, 2021
  • Closeup side view of group of mid 20's mobile application developers testing the code and fixing the issues.
    Image attribution tooltip
    gilaxia via Getty Images
    Image attribution tooltip

    Executives fail to make software supply chain security a priority, report finds

    The disconnect between rhetoric and performance in the software development and security industries are part of an internal debate: Which sector should take the lead?

    By Sept. 14, 2021
  • Image attribution tooltip

     istock: ArthurHidden

    Image attribution tooltip
    Sponsored by Code42

    The Great Resignation and the risk of data loss

    The Great Resignation is upon us and with it comes data loss.

    Sept. 13, 2021
  • A lit Microsoft log seen above a group of people in shadow.
    Image attribution tooltip
    Jeenah Moon via Getty Images
    Image attribution tooltip

    Exploits underway for Microsoft zero day leveraging Office documents

    Until a patch is developed, the company recommends disabling ActiveX in Internet Explorer. But Huntress researchers found the workaround is not functional in all cases.

    By Samantha Schwartz , Updated Sept. 10, 2021
  • Business professionals in an office breakou room with see through windows, and a couple of blurred people passing by. There is an orange filter on the image.
    Image attribution tooltip

    iStock.com/pixelfit

    Image attribution tooltip
    Sponsored by Code42

    Are you ready for the second wave of digital transformation?

    In the second wave of digital transformation, understanding Insider Risk is more important than ever.  

    Sept. 7, 2021
  • A Black person types on a laptop
    Image attribution tooltip

    Photo by cottonbro from Pexels

    Image attribution tooltip

    Cyber Command urges immediate patching for Atlassian Confluence bug

    Atlassian Cloud customers are not impacted by the vulnerability.

    By Samantha Schwartz • Sept. 3, 2021
  • Image attribution tooltip
    Nigel Treblin via Getty Images
    Image attribution tooltip

    Machine identity remains a mystery, threatening digital security

    As organizations undergo digital transformation, security often depends on authenticating the identity of connected machines. 

    By Sept. 2, 2021
  • A lit Microsoft log seen above a group of people in shadow.
    Image attribution tooltip
    Jeenah Moon via Getty Images
    Image attribution tooltip

    Azure flaw exposes enterprise databases, raising questions on cloud security

    The flaw dates back to 2019, when Microsoft added a data-visualization feature called Jupyter Notebook to the Cosmos DB, Wiz researchers said.

    By Aug. 30, 2021
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    More threats target Linux, a foundation for the cloud, report finds

    As enterprises embrace cloud, malicious actors are finding sophisticated methods to threaten users for computing power and data theft. 

    By Aug. 25, 2021
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Microsoft Exchange vulnerabilities targeted in ProxyShell attacks

    Conti affiliates are now using ProxyShell exploits to target organizations during ransomware attacks, researchers found. 

    By Updated Sept. 7, 2021
  • Image attribution tooltip
    Christopher Furlong via Getty Images
    Image attribution tooltip

    Men more likely to engage in risky online behavior: report

    Male employees are three times as likely to click on phishing emails, forget passwords or stream pirated content, SecurityAdvisor's research shows. 

    By Aug. 20, 2021
  • FDA warns of BlackBerry OS vulnerability in medical devices

    The OS is often deployed in cardiac and patient monitors, drug infusion pumps, imaging, and surgical robots, according to the CEO of security consultancy Harbor Labs.

    By Greg Slabodkin • Aug. 19, 2021
  • Image attribution tooltip
    Stringer via Getty Images
    Image attribution tooltip

    The most vulnerable ICS assets: operations management

    A vulnerability's complexity is irrelevant if an exploit exists to sidestep security layers.

    By Samantha Schwartz • Aug. 18, 2021
  • cyberattack, privacy, connection
    Image attribution tooltip
    Orbon Alija/ E+/Getty via Getty Images
    Image attribution tooltip

    Up to 83M IoT devices at risk of remote access

    With a risk score of 9.6 out of 10, the ThroughTek "Kalay" vulnerability could allow malicious actors to watch real-time video or gain access to credentials usable in future attacks.

    By Aug. 18, 2021
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    How much does phishing really cost the enterprise?

    Ransomware and business email compromise are adding layers of risk, slowing productivity at U.S. companies.

    By Aug. 17, 2021
  • Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    Researchers withholding vulnerabilities can create path to supply chain hacks

    Bug bounty programs incentivize researchers to fully develop vulnerabilities by offering higher payouts. But that can create risk for the enterprise, Corellium's Matt Tait said.

    By Samantha Schwartz • Aug. 5, 2021