Vulnerability: Page 23


  • Image attribution tooltip
    Getty Images / Staff via Getty Images
    Image attribution tooltip

    APT actors ramp up cyber campaign targeting Pulse Secure VPNs

    Mandiant researchers have identified four new malware families in an ongoing campaign targeting several key sectors, including the U.S. defense industry.

    By May 28, 2021
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Compromised cloud costs companies $6.2M annually, study finds

    Attackers heavily target Microsoft 365 and Google Workspace accounts using brute force or phishing attacks, according to Ponemon Institute research.

    By May 27, 2021
  • Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    Threat actors scan for vulnerabilities faster than enterprises can respond: Palo Alto

    Within five minutes of Microsoft's March disclosure of Exchange zero days, cyber adversaries began scanning networks for the flaw, research found. 

    By May 26, 2021
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Off-the-shelf tools, unsophisticated techniques threaten industrial systems

    Attacks have targeted internet-exposed OT providers that range from water control systems to solar energy panels, Mandiant research found.

    By May 25, 2021
  • A woman views an art installation created with artificial intelligence.
    Image attribution tooltip
    Chris McGrath via Getty Images
    Image attribution tooltip

    AI will change scale and scope of hacking, security expert says

    Artificial intelligence could push the boundaries of hacking in ways that increase risk, according to security thought leader Bruce Schneier. But, AI could also boost defenses. 

    By May 18, 2021
  • Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Colonial Pipeline disconnects OT systems to silo ransomware IT threat

    Anxiety is rising among corporate security officials concerned about the impact of ransomware among critical infrastructure providers.

    By May 12, 2021
  • Image attribution tooltip
    Michael M. Santiago via Getty Images via Getty Images
    Image attribution tooltip

    Critical infrastructure flaws surface after years of underinvestment, inaction

    Providers — particularly in the energy sector — knew the warning signs but were slow to respond.

    By May 11, 2021
  • Image attribution tooltip
    Tomohiro Ohsumi via Getty Images
    Image attribution tooltip

    Demand for software transparency grows in more vulnerable supply chains

    Catching vulnerabilities before the code is packaged into proprietary solutions has industry at a standstill.

    By Samantha Schwartz • May 11, 2021
  • Image attribution tooltip
    Getty Images / Staff via Getty Images
    Image attribution tooltip

    VPN vulnerabilities haunt defense industry as threat actors find new openings

    APT actors have exploited longstanding vulnerabilities in Pulse Secure and other devices to gain access to government agencies and the private sector. 

    By May 10, 2021
  • Image attribution tooltip
    filadendron via Getty Images
    Image attribution tooltip
    Sponsored by HID Global

    3 reasons why you're more vulnerable than you think to fraud

    Fraud prevention in the age of multiple digital channels has become a never-ending struggle and maintaining a seamless user experience and security is crucial.

    May 10, 2021
  • Image attribution tooltip
    Stefani Reynolds / Stringer via Getty Images
    Image attribution tooltip

    Cyberthreats dog the US supply chain, complicated by global competition

    As companies acquire components and services, they need mechanisms to ensure backdoors are not lurking in their systems, experts at the Hack the Capitol 2021 conference said.

    By May 5, 2021
  • A woman working from home
    Image attribution tooltip
    damircudic via Getty Images
    Image attribution tooltip

    Password managers are a necessary — yet vulnerable — last line of defense

    The Passwordstate breach is forcing CISOs and researchers to review vendors and reassess security practices.

    By May 4, 2021
  • A woman working from home
    Image attribution tooltip
    damircudic via Getty Images
    Image attribution tooltip

    Work from home means far less security visibility, report says

    The number of incidents are surging as companies shift to multicloud environments and struggle to track endpoint and IoT security. 

    By April 28, 2021
  • Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    Cyberattack on Passwordstate tests confidence in password managers

    The supply chain attack is raising questions about how best to deploy and secure the tools as corporations face heightened threats across the globe.

    By April 27, 2021
  • Image attribution tooltip
    Tomohiro Ohsumi via Getty Images
    Image attribution tooltip

    Software bug bests MacOS notarization protocols

    The update, which fixes the bug, is available in MacOS version 11.3.

    By Samantha Schwartz • April 27, 2021
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Traitov/iStock/Getty via Getty Images
    Image attribution tooltip

    Attackers leverage Pulse Secure VPNs to target defense, financial industries

    Cybersecurity and Infrastructure Security Agency warned federal agencies of "unacceptable risk" in the latest campaign linked to suspected APT actors.

    By April 22, 2021
  • cyberattack, privacy, connection
    Image attribution tooltip
    Stock Photo via Getty Images
    Image attribution tooltip

    Companies take second look at third-party risk management programs

    As part of the supply chain web, monitoring the vendors of a company's vendor, called Nth party risk, has become a critical part of protecting companies from potential threats.

    By April 20, 2021
  • A man looks at lines of code depicted on a computer screen
    Image attribution tooltip
    sestovic via Getty Images
    Image attribution tooltip

    25% of utilities exposed to SolarWinds hack amid growing ICS vulnerabilities, analysts say

    Security experts warn it may be too soon to tell whether follow-on activity has occurred.

    By Robert Walton • April 16, 2021
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Poor management of privileged accounts leaves organizations open to attack

    Access gaps open the door for malicious threat actors to hide inside the corporate systems using trusted identities to exfiltrate data. 

    By April 15, 2021
  • Feds launch coordinated effort to mitigate remaining Microsoft Exchange flaws

    A court-approved operation to remove web shells coincided with a push to get government and private sector systems patched with critical security updates.

    By April 14, 2021
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    100M devices susceptible to NAME:WRECK DNS vulnerabilities, researchers say

    Each vulnerability could lead to a denial of service attack, or an attacker could take control of a susceptible device through remote code execution.

    By Samantha Schwartz • April 14, 2021
  • A Black man working on a laptop
    Image attribution tooltip
    Ono Kosuki. Retrieved from Pexels.
    Image attribution tooltip

    Half of business continuity changes hurt cybersecurity, study shows

    Companies take a second look at security practices after business pressures put mobile security at risk, a Verizon report shows.

    By April 12, 2021
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    Enterprise security leaders fear rising AI use among threat actors: report

    Some experts are urging companies to incorporate AI into their cyber defense strategies, while others view the threat of AI as overhyped marketing.

    By April 9, 2021
  • woman uses a computer while sitting on a couch
    Image attribution tooltip
    Wormwood, Matilda. Retrieved from Pexels.
    Image attribution tooltip

    VPN security falls short as demand increases for remote workforce at scale

    Despite repeated warnings, enterprise customers have fallen behind on patching and upgrades as internal productivity needs take priority. 

    By April 7, 2021
  • Close up of a person typing on a laptop
    Image attribution tooltip
    SARINYAPINNGAM via Getty Images
    Image attribution tooltip

    Employees can't quit habit of writing down, sharing passwords

    Amid heightened threats, workers are incorporating company names into passwords, writing them on sticky notes and sharing them via email.

    By April 6, 2021