Vulnerability: Page 5


  • Digital code data numbers and secure lock icons on hacker's hands working with keyboard computer on dark blue tone background.
    Image attribution tooltip
    Techa Tungateja via Getty Images
    Image attribution tooltip

    Cleo releases CVE for actively exploited flaw in file-transfer software

    Researchers confirmed a new zero-day vulnerability is separate from a flaw originally disclosed in October. A notorious ransomware group linked itself to the attacks.

    By Dec. 16, 2024
  • Team of hackers dressed in black work on computers in dark room.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Security community raises concern as Cleo file-transfer CVE delayed

    After the company urged users to patch a critical flaw, researchers are asking about the lack of a CVE and additional guidance.

    By Dec. 13, 2024
  • cybersecurity, matrix, abstract
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    Cleo releases new patch as threat groups ramp up exploitation of critical CVE

    Researchers warned that companies primarily in the trucking, food, retail and shipping industries were under attack.

    By Dec. 12, 2024
  • Close-up Portrait of Software Engineer Working on Computer, Line of Code Reflecting in Glasses.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Critical flaw in Cleo file-transfer software is under mass exploitation

    The company is working on a new patch and CVE as an existing patch for a previously disclosed vulnerability is not providing adequate protection.

    By Updated Dec. 11, 2024
  • Cyber security  firewall interface protection concept. Businesswoman protecting herself from cyber attacks. Personal data security and banking
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    CISA, German cyber authorities warn Zyxel firewalls facing active exploitation

    Attackers have targeted dozens of companies with Helldown ransomware, researchers found.

    By Dec. 4, 2024
  • Programming scripts on laptop monitor, unauthorized remote hacking of server
    Image attribution tooltip
    Motortion via Getty Images
    Image attribution tooltip

    Palo Alto Networks pushes back as Shadowserver spots 2K of its firewalls exploited

    The security vendor maintains only a limited number of customers’ firewalls have been exploited by a zero-day it patched earlier this week.

    By Nov. 22, 2024
  • Matrix background of blurred programming code.
    Image attribution tooltip
    Getty Plus via Getty Images
    Image attribution tooltip

    Palo Alto Networks customers grapple with another actively exploited zero-day

    The security vendor warned of an unconfirmed vulnerability in PAN-OS earlier this month. A CVE entry and patch came 10 days later.

    By Nov. 19, 2024
  • Image attribution tooltip
    Win McNamee via Getty Images
    Image attribution tooltip

    Federal probe finds vulnerabilities across more than 300 US water systems

    The Environmental Protection Agency lacks a documented plan to coordinate incident reporting with CISA, the agency’s Office of Inspector General found.

    By Nov. 19, 2024
  • Palo Alto Networks
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Palo Alto Networks’ customer migration tool hit by trio of CVE exploits

    CISA warned of two critical and actively exploited vulnerabilities in Expedition one week after another CVE came under active exploitation in the same product.

    By Nov. 15, 2024
  • Microsoft President and Vice Chair Brad Smith speaks April 12, 2023, at the Semafor World Economy Summit in Washington D.C.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Microsoft revamps how it will disclose vulnerabilities

    The company said the additional disclosure method using the Common Security Advisory Framework will help organizations better prioritize CVEs.

    By Nov. 15, 2024
  • Exterior of Citrix office complex.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    Citrix Session Recording users warned of CVEs that allow hackers to gain control

    Security researchers at watchTowr discovered the flaw and claim attackers can gain access without authentication, a finding which Citrix disputes.

    By Nov. 13, 2024
  • cybersecurity, matrix, abstract
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    Zero-days from top security vendors were most exploited CVEs in 2023

    The top five vulnerabilities exploited by attackers last year were found in security gear from Citrix, Cisco and Fortinet, the Five Eyes’ cyber agencies found.

    By Nov. 13, 2024
  • A closeup shot of long colorful lines of code on a computer screen.
    Image attribution tooltip
    Wirestock via Getty Images
    Image attribution tooltip

    Critical Veeam CVE targeted by new ransomware variant

    Multiple ransomware variants are now targeting the CVE, which has a CVSS of 9.8. For customers, the risk of exploitation is only increasing.

    By Nov. 12, 2024
  • password to access personal user data, cybersecurity concept
    Image attribution tooltip

    stock.adobe.com/Song_about_summer

    Image attribution tooltip
    Sponsored by Imprivata

    The company you keep: your most trusted vendor could be your biggest security risk

    Your trusted vendor might be your biggest security risk. Learn how to mitigate third-party threats.

    By Joel Burleson-Davis, SVP Worldwide Engineering, Cyber, Imprivata • Nov. 11, 2024
  • Fortinet office in Nepean, Canada.
    Image attribution tooltip
    iStock Editorial / Getty Images Plus via Getty Images
    Image attribution tooltip

    Fortinet finds more malicious IPs linked to widely exploited zero-day

    The cybersecurity vendor said the additional indicators of compromise don’t reflect any major changes. Researchers warn thousands of devices remain exposed.

    By Oct. 31, 2024
  • An image COBOL computer code pictured on a green-screen computer monitor.
    Image attribution tooltip
    tigermad via Getty Images
    Image attribution tooltip

    Poor vulnerability management could indicate larger cyber governance issues, S&P says

    Companies that fail to properly mitigate security vulnerabilities are leaving themselves open to malicious activity, the research firm said.

    By Oct. 29, 2024
  • Fingers hover over a computer keyboard with numbers on a screen, against a shadowy backdrop.
    Image attribution tooltip
    jariyawat thinsandee via Getty Images
    Image attribution tooltip

    Cisco warns actively exploited CVE can lead to DoS attacks against VPN services

    The company warned the threat activity is linked to previously disclosed brute-force attacks beginning in March.

    By Oct. 28, 2024
  • Data privacy
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    Critical Veeam CVE actively exploited in ransomware attacks

    Multiple ransomware groups targeted the vulnerability, which has a CVSS score of 9.8, more than a month after it was disclosed and patched by the data backup and recovery vendor.

    By Oct. 22, 2024
  • Microsoft President and Vice Chair Brad Smith speaks April 12, 2023, at the Semafor World Economy Summit in Washington D.C.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Microsoft confirms partial loss of security log data on multiple platforms

    The company previously expanded free access to security logs on several platforms, including Purview, following the 2023 state-linked hack of Exchange Online.

    By Oct. 18, 2024
  • CISA Director Jen Easterly speaks at Carnegie Mellon University urging the tech industry to embrace secure-by-design product development.
    Image attribution tooltip
    Permission granted by Carnegie Mellon University
    Image attribution tooltip

    FBI, CISA seek input on software security, configuration changes

    Authorities are seeking public comment on steps the software industry can take to make their products more resistant to malicious threat activity.

    By Oct. 17, 2024
  • SolarWinds
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by ismagilov via Getty Images
    Image attribution tooltip

    CISA adds SolarWinds flaw to exploited vulnerabilities catalog

    A hardcoded credentials vulnerability in SolarWinds Web Help Desk lets attackers read and modify sensitive help desk ticket information.

    By Oct. 16, 2024
  • An image of a digital lock is shown
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Critical CVE in 4 Fortinet products actively exploited

    CISA added the format string vulnerability to its known exploited vulnerabilities catalog last week, months after it was first disclosed by the company.

    By Oct. 14, 2024
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA’s vulnerability management program spotted 250 critical CVEs in 2023

    The 51 federal civilian agencies involved in the program remediated 872 vulnerabilities last year, up 78% increase from 2022, according to CISA.

    By Oct. 4, 2024
  • Cyberhackers-Ransomware
    Image attribution tooltip
    (Gorodenkoff) via Getty Images
    Image attribution tooltip

    Ivanti up against another attack spree as hackers target its endpoint manager

    Ivanti customers are facing a new series of exploitation attempts after the company pledged in April to launch a comprehensive overhaul of its internal security practices.

    By Oct. 3, 2024
  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    CUPS vulnerability, a near miss, delivers another warning for open source

    While a major crisis was averted, the disclosures may open up needed conversations about transparency and coordination, according to researchers.

    By Sept. 30, 2024