Vulnerability: Page 3


  • closeup of hands on a keyboard, software code featured in the screen
    Image attribution tooltip
    scyther5 via Getty Images
    Image attribution tooltip

    GitHub Action compromise linked to previously undisclosed attack

    Researchers uncovered a March 11 incident that may have led to the larger supply chain attack.  

    By March 20, 2025
  • Digital technology vector background depicting a cyberattack.
    Image attribution tooltip
    WhataWin via Getty Images
    Image attribution tooltip

    Cisco Smart Licensing Utility flaws under attack

    The SANS Internet Storm Center reported exploitation attempts against two critical vulnerabilities, which were initially disclosed in September.

    By March 20, 2025
  • Microsoft, antitrust, Alaily, FTC. Google
    Image attribution tooltip
    David Ramos via Getty Images
    Image attribution tooltip

    11 nation-state groups exploit unpatched Microsoft zero-day

    The tech giant has yet to address a vulnerability that allows for malicious payloads to be delivered via Windows shortcut files and has been under active attack for eight years.

    By Elizabeth Montalbano, Contributing Reporter • March 19, 2025
  • Dozens of lines of computer code on a monitor.
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    AI project failure rates are on the rise: report

    The share of businesses scrapping most of their AI initiatives increased to 42% this year, up from 17% last year, according to S&P Global Market Intelligence. 

    By Lindsey Wilkinson • March 18, 2025
  • A tech worker eviews code on a computer screen
    Image attribution tooltip
    MTStock Studio via Getty Images
    Image attribution tooltip

    Supply chain attack against GitHub Action triggers massive exposure of secrets

    The incident highlights ongoing security concerns in the software supply chain.

    By March 17, 2025
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    SuperBlack ransomware used to exploit Fortinet vulnerabilities

    A report by Forescout Research points to a threat actor with ties to LockBit.

    By March 14, 2025
  • A person types on a laptop in a dark room.
    Image attribution tooltip
    jariyawat thinsandee via Getty Images
    Image attribution tooltip

    Juniper MX routers targeted by China-nexus threat group using custom backdoors

    The devices have reached end-of-life status and need to be upgraded, as the company has issued in a security advisory.

    By March 12, 2025
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA: 3 Ivanti endpoint vulnerabilities exploited in the wild

    Researchers last month published a proof-of-concept exploit for the critical flaws in Endpoint Manager.

    By March 11, 2025
  • Digital technology vector background depicting a cyberattack.
    Image attribution tooltip
    WhataWin via Getty Images
    Image attribution tooltip

    Critical PHP vulnerability under widespread cyberattack

    Telemetry data shows spikes in exploits of CVE-2024-4577 across several countries in recent months.

    By March 10, 2025
  • Close-up Portrait of Software Engineer Working on Computer, Line of Code Reflecting in Glasses.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Eleven11bot estimates revised downward as researchers point to Mirai variant

    The botnet has been involved in DDoS activity targeting telecom companies and gaming platforms.

    By March 7, 2025
  • Technician services a cloud server.
    Image attribution tooltip
    anandaBGD via Getty Images
    Image attribution tooltip

    37K+ VMware ESXi instances vulnerable to critical zero-day

    Some customers have been unable to download the patches for three VMware zero-day vulnerabilities due to an issue with the Broadcom Support Portal.

    By March 6, 2025
  • A sign is posted in front of a Broadcom office on December 12, 2024 in San Jose, California.
    Image attribution tooltip
    Justin Sullivan / Staff via Getty Images
    Image attribution tooltip

    Broadcom urges customers to patch 3 zero-day VMware flaws

    Cyberattackers with administrative access are actively exploiting vulnerabilities in ESXi, Workstation and Fusion products.

    By Elizabeth Montalbano, Contributing Reporter • March 5, 2025
  • words zero day highlighted in code
    Image attribution tooltip
    JUN LI via Getty Images
    Image attribution tooltip

    Microsoft-signed driver used in ransomware attacks

    Threat actors are exploiting a privilege escalation flaw in Paragon Partition Manager for “bring your own vulnerable driver” (BYOVD) attacks.

    By March 3, 2025
  • exclamation point depicted hovering above network infrastructure
    Image attribution tooltip
    Just_Super/Getty Images via Getty Images
    Image attribution tooltip

    Leaked ransomware chat logs reveal Black Basta’s targeted CVEs

    Cybercrime group focused on Microsoft vulnerabilities as well as flaws in network edge devices and communications software.

    By Feb. 27, 2025
  • A closeup shot of long colorful lines of code on a computer screen.
    Image attribution tooltip
    Wirestock via Getty Images
    Image attribution tooltip

    Nearly 3K Ivanti Connect Secure instances vulnerable to critical flaw

    U.S. has the most VPNs not yet patched for CVE-2025-22467.

    By Feb. 26, 2025
  • Programming scripts on laptop monitor, unauthorized remote hacking of server
    Image attribution tooltip
    Motortion via Getty Images
    Image attribution tooltip

    More than 400 SonicWall firewall instances remain vulnerable to attack

    Researchers previously warned of exploitation attempts after the release of a proof of concept.

    By Feb. 25, 2025
  • The red lock and its structure explode in a digital computer setting.
    Image attribution tooltip
    TU IS via Getty Images
    Image attribution tooltip

    Attackers exploiting Cisco vulnerabilities tied to Salt Typhoon campaign

    GreyNoise observed exploitation of CVE-2018-0171, which Cisco Talos researchers said was used in a recent attack by the China-backed threat group.

    By Feb. 25, 2025
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Traitov/iStock/Getty via Getty Images
    Image attribution tooltip

    Palo Alto Networks warns hackers attempting to exploit a file read flaw in firewalls

    Threat actors are chaining the CVE with at least one prior flaw to enable the hack attempts.

    By Feb. 24, 2025
  • A sign is seen at the Microsoft headquarters on July 3, 2024 in Redmond, Washington.
    Image attribution tooltip
    David Ryder via Getty Images
    Image attribution tooltip

    Microsoft Power Pages vulnerability exploited in the wild

    The high-severity privilege escalation flaw in Microsoft's website building application was disclosed and patched last week.  

    By Feb. 24, 2025
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    US authorities warn Ghost ransomware leverages older CVEs

    The China-linked threat group has targeted critical infrastructure providers in more than 70 countries.

    By Feb. 20, 2025
  • Photograph depicts a security scanner extracting virus from a string of binary code.
    Image attribution tooltip
    Hailshadow via Getty Images
    Image attribution tooltip

    Proof-of-concept exploit released for 4 Ivanti vulnerabilities

    Critical flaws in Ivanti Endpoint Manager were initially disclosed and patched last month.

    By Updated Feb. 20, 2025
  • New generation internet technologies and security bug.
    Image attribution tooltip
    Devrimb
    Image attribution tooltip

    SonicWall authentication flaw under threat of active exploitation

    Weeks after the company released a patch, researchers warn the CVE is being targeted by threat actors.

    By Feb. 19, 2025
  • Login information attached to large hook hanging in front of computer keyboard.
    Image attribution tooltip
    Philip Steury via Getty Images
    Image attribution tooltip

    Phishing campaign targets Microsoft device-code authentication flows

    Russian state-sponsored hackers have attacked enterprises and government agencies in North America and overseas.

    By Feb. 18, 2025
  • Palo Alto Networks
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Palo Alto Networks warns firewall vulnerability is under active exploitation

    The flaw, when chained together with a prior vulnerability, can allow an attacker to gain access to unpatched firewalls.

    By Feb. 18, 2025
  • Man studying see-through display depicting computer code.
    Image attribution tooltip
    Laurence Dutton via Getty Images
    Image attribution tooltip

    FBI, CISA warn hackers abusing buffer overflow CVEs to launch attacks

    The agencies are urging manufacturers to shift development practices through the use of memory safe code.

    By Feb. 13, 2025