Vulnerability: Page 24


  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Traitov/iStock/Getty via Getty Images
    Image attribution tooltip

    Half of companies lack security to support cloud-based IAM: report

    Almost all (98%) of IT executives report challenges with IAM sourced from the cloud, including lack of visibility and increased complexity.

    By April 1, 2021
  • Enterprises lag on firmware security spending in face of rising threat

    IT security officials are often more worried about the difficulty of detecting malware threats, in part because firmware attacks are hard to catch, a Microsoft-commissioned report found. 

    By April 1, 2021
  • Molson Coors incident shines a light on industrial cyberattack vulnerabilities

    The international brewery continues to face delays and financial impacts amid a wave of attacks against manufacturing.

    By March 30, 2021
  • Security leaders: Expect more insider data leaks, threats in 2021

    The rise stems from a lack of accurate insight from data loss prevention and cloud access security broker technologies.

    By March 29, 2021
  • To combat open source insecurity, companies need tech and leadership

    With software dependencies commonplace, it's up to industry to clear a path to greater supply chain security in software.

    By Samantha Schwartz • March 26, 2021
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Spending on IAM, zero trust to rise as companies extend remote work

    The shift to remote work placed more pressure on IT and security departments to secure corporate data without interrupting productivity.

    By March 23, 2021
  • SolarWinds threat actors accessing Microsoft 365 by altering permissions

    Mandiant observed a threat actor linked to the SolarWinds campaign using a stealthy approach to read email in targeted mailboxes.

    By March 22, 2021
  • Opinion

    Prioritizing risk in M&A due diligence in the COVID-19 era, and beyond

    Imagine acquiring a company with an infected network, and then connecting your company to that flawed network. That can introduce serious issues into a previously protected company. 

    By Ray Rothrock • March 22, 2021
  • A man looks at lines of code depicted on a computer screen
    Image attribution tooltip
    sestovic via Getty Images
    Image attribution tooltip

    Microsoft Exchange fixes arrive, but some companies lack IT resources to repair

    Security specialists and managed-service providers are filling the void at thousands of small firms that operate with limited IT and cybersecurity staffing. 

    By March 19, 2021
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    Federal watchdog warns of cybersecurity risks to employee retirement plans

    Fiduciaries might not realize they could be liable for losses they were obligated to prevent, the Government Accountability Office says. 

    By Jim Tyson • March 18, 2021
  • Mimecast migrates to Cisco following supply chain attack

    A forensic investigation with FireEye's Mandiant unit confirmed the SolarWinds threat actor did not modify Mimecast's source code.

    By March 17, 2021
  • Ransomware targeting Microsoft Exchange echoes WannaCry — with a human element

    This isn't the first time nation-state exploit kits were released and other bad actors took advantage.

    By Samantha Schwartz • March 16, 2021
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    White House looks to tighten private sector coordination, gain infrastructure insight

    Following the Microsoft Exchange and SolarWinds attacks, the Biden administration is taking steps to close visibility gaps and encourage rapid intelligence sharing by private sector companies. 

    By March 15, 2021
  • Microsoft deploys more updates to contain Exchange server fallout

    The FBI and CISA are warning of additional threats from nation states and threat actors as patching and security updates leave many vulnerable companies exposed. 

    By March 12, 2021
  • Image attribution tooltip
    Kendall Davis/Cybersecurity Dive
    Image attribution tooltip

    Enterprises scramble to secure Microsoft Exchange as cybercriminals rush in

    Researchers fear, more than two months after the threat was discovered, criminal hackers have had plenty of time to loot data or plant undetected seeds of compromise.

    By March 10, 2021
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    How do companies assess risk? It's a system-by-system question

    Every piece of technology is vulnerable to threat actors, but each organization and cybersecurity team decides which software and technology adds risk to its business operations.

    By Sue Poremba • March 9, 2021
  • Microsoft Exchange server compromise escalates as mitigation efforts fall short

    Officials warn that patching may not fix compromised systems, while tens of thousands of customers are potentially at risk.

    By March 8, 2021
  • cyberattack, privacy, connection
    Image attribution tooltip
    Stock Photo via Getty Images
    Image attribution tooltip

    Exploited Microsoft Exchange campaign hits hundreds of organizations, researchers find

    The nation-state campaign, which Microsoft has linked to China, have targeted on-premises Exchange server vulnerabilities to steal U.S. enterprise data. 

    By March 3, 2021
  • Companies overestimate ability to manage remote worker security

    Employees working outside the office are granted excessive access privileges and are falling prey to phishing attacks, research from Tanium and PSB Insights found.

    By March 2, 2021
  • Image attribution tooltip
    "Google Bike" by R Boed is licensed under CC BY 2.0
    Image attribution tooltip

    Google Cloud enters cyber insurance collaboration with Allianz, Munich Re

    The agreement comes amid increased financial pressure on the cyber insurance industry due to a rise in ransomware and the historic nation-state attack against SolarWinds.

    By March 2, 2021
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Legacy tech, privacy and security issues bog down healthcare innovation

    The pandemic drove hospitals and healthcare facilities to further rely on connected devices, increasing the potential for vulnerabilities in the process.

    By Roberto Torres • Feb. 26, 2021
  • Researchers find vulnerabilities inside multiple virtual event, business platforms

    Two of the top five virtual event sites leaked personal information or exposed databases to potential remote code execution.

    By Feb. 25, 2021
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    FireEye identifies 2 threat activity clusters behind Accellion hack

    The security firm has labeled one activity cluster for exploiting the FTA vulnerabilities and the other for extortion.

    By Samantha Schwartz • Feb. 23, 2021
  • Water system hack reveals thousands of organizations vulnerable to Window 7 exposure

    Critical infrastructure providers and SMBs continue to operate the outdated Microsoft OS without security updates and patches.

    By Feb. 19, 2021
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    Organizations running SolarWinds Orion online drops 25% since December: report

    A report by RiskRecon shows only 8% of entities operating on the internet actually upgraded to later versions based on SolarWinds security recommendations.

    By Feb. 12, 2021