Vulnerability: Page 5


  • Close-up Portrait of Software Engineer Working on Computer, Line of Code Reflecting in Glasses.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Eleven11bot estimates revised downward as researchers point to Mirai variant

    The botnet has been involved in DDoS activity targeting telecom companies and gaming platforms.

    By March 7, 2025
  • Technician services a cloud server.
    Image attribution tooltip
    anandaBGD via Getty Images
    Image attribution tooltip

    37K+ VMware ESXi instances vulnerable to critical zero-day

    Some customers have been unable to download the patches for three VMware zero-day vulnerabilities due to an issue with the Broadcom Support Portal.

    By March 6, 2025
  • A sign is posted in front of a Broadcom office on December 12, 2024 in San Jose, California.
    Image attribution tooltip
    Justin Sullivan / Staff via Getty Images
    Image attribution tooltip

    Broadcom urges customers to patch 3 zero-day VMware flaws

    Cyberattackers with administrative access are actively exploiting vulnerabilities in ESXi, Workstation and Fusion products.

    By Elizabeth Montalbano, Contributing Reporter • March 5, 2025
  • words zero day highlighted in code
    Image attribution tooltip
    JUN LI via Getty Images
    Image attribution tooltip

    Microsoft-signed driver used in ransomware attacks

    Threat actors are exploiting a privilege escalation flaw in Paragon Partition Manager for “bring your own vulnerable driver” (BYOVD) attacks.

    By March 3, 2025
  • exclamation point depicted hovering above network infrastructure
    Image attribution tooltip
    Just_Super/Getty Images via Getty Images
    Image attribution tooltip

    Leaked ransomware chat logs reveal Black Basta’s targeted CVEs

    Cybercrime group focused on Microsoft vulnerabilities as well as flaws in network edge devices and communications software.

    By Feb. 27, 2025
  • A closeup shot of long colorful lines of code on a computer screen.
    Image attribution tooltip
    Wirestock via Getty Images
    Image attribution tooltip

    Nearly 3K Ivanti Connect Secure instances vulnerable to critical flaw

    U.S. has the most VPNs not yet patched for CVE-2025-22467.

    By Feb. 26, 2025
  • Programming scripts on laptop monitor, unauthorized remote hacking of server
    Image attribution tooltip
    Motortion via Getty Images
    Image attribution tooltip

    More than 400 SonicWall firewall instances remain vulnerable to attack

    Researchers previously warned of exploitation attempts after the release of a proof of concept.

    By Feb. 25, 2025
  • The red lock and its structure explode in a digital computer setting.
    Image attribution tooltip
    TU IS via Getty Images
    Image attribution tooltip

    Attackers exploiting Cisco vulnerabilities tied to Salt Typhoon campaign

    GreyNoise observed exploitation of CVE-2018-0171, which Cisco Talos researchers said was used in a recent attack by the China-backed threat group.

    By Feb. 25, 2025
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Traitov/iStock/Getty via Getty Images
    Image attribution tooltip

    Palo Alto Networks warns hackers attempting to exploit a file read flaw in firewalls

    Threat actors are chaining the CVE with at least one prior flaw to enable the hack attempts.

    By Feb. 24, 2025
  • A sign is seen at the Microsoft headquarters on July 3, 2024 in Redmond, Washington.
    Image attribution tooltip
    David Ryder via Getty Images
    Image attribution tooltip

    Microsoft Power Pages vulnerability exploited in the wild

    The high-severity privilege escalation flaw in Microsoft's website building application was disclosed and patched last week.  

    By Feb. 24, 2025
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    US authorities warn Ghost ransomware leverages older CVEs

    The China-linked threat group has targeted critical infrastructure providers in more than 70 countries.

    By Feb. 20, 2025
  • A security scanner extracts the code of a computer virus from a string of binary code (1s and 0s).
    Image attribution tooltip
    Hailshadow via Getty Images
    Image attribution tooltip

    Proof-of-concept exploit released for 4 Ivanti vulnerabilities

    Critical flaws in Ivanti Endpoint Manager were initially disclosed and patched last month.

    By Updated Feb. 20, 2025
  • New generation internet technologies and security bug.
    Image attribution tooltip
    Devrimb
    Image attribution tooltip

    SonicWall authentication flaw under threat of active exploitation

    Weeks after the company released a patch, researchers warn the CVE is being targeted by threat actors.

    By Feb. 19, 2025
  • Login information attached to large hook hanging in front of computer keyboard.
    Image attribution tooltip
    Philip Steury via Getty Images
    Image attribution tooltip

    Phishing campaign targets Microsoft device-code authentication flows

    Russian state-sponsored hackers have attacked enterprises and government agencies in North America and overseas.

    By Feb. 18, 2025
  • Palo Alto Networks
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Palo Alto Networks warns firewall vulnerability is under active exploitation

    The flaw, when chained together with a prior vulnerability, can allow an attacker to gain access to unpatched firewalls.

    By Feb. 18, 2025
  • Man studying see-through display depicting computer code.
    Image attribution tooltip
    Laurence Dutton via Getty Images
    Image attribution tooltip

    FBI, CISA warn hackers abusing buffer overflow CVEs to launch attacks

    The agencies are urging manufacturers to shift development practices through the use of memory safe code.

    By Feb. 13, 2025
  • Telecom network above a city
    Image attribution tooltip
    NicoElNino via Getty Images
    Image attribution tooltip

    China-backed hackers continue cyberattacks on telecom companies

    Salt Typhoon threat actors compromised Cisco edge devices by exploiting older vulnerabilities.

    By Feb. 13, 2025
  • Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol. 3d rendering.
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    VeraCore zero-day vulnerabilities exploited in supply chain attacks

    Cybercriminals maintained access to one victim organization for more than four years.

    By Feb. 11, 2025
  • A large sign sits out front of construction technology firm Trimble's headquarters in Westminster, Colorado. The sign reads "Trimble", and a large building looms in the background.
    Image attribution tooltip
    Courtesy of Trimble
    Image attribution tooltip

    CISA warns of hackers targeting vulnerability in Trimble Cityworks to conduct RCE

    The software is widely used in projects by local governments, utilities, airports and other facilities.

    By Feb. 10, 2025
  • Exterior view of Microsoft's Vancouver office in Canada on December 22, 2023.
    Image attribution tooltip
    hapabapa via Getty Images
    Image attribution tooltip

    Microsoft warns 3K exposed ASP.NET machine keys at risk of weaponization

    An unknown threat actor recently used an exposed key for code injection cyberattacks. 

    By Feb. 7, 2025
  • Group of professionals collaborating in a bright, modern office space designed for co-working and teamwork.
    Image attribution tooltip
    miniseries via Getty Images
    Image attribution tooltip

    AI agents spark interest, concern for businesses in 2025

    Leaders have high hopes for autonomous capabilities, but adding the technology will raise the stakes for security and governance.

    By Lindsey Wilkinson • Feb. 6, 2025
  • Hooded person types on computer in a dark room with multiple monitors and cables everywhere.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Exploitation of vulnerability in Zyxel CPE targets legacy routers

    Zyxel urged users to replace their old devices with modern, supported versions.

    By Feb. 4, 2025
  • Cyber Security Data Breach Protection Ransomware Email Phishing Encrypted Technology, Digital Information Protected Secured
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    State-linked hackers deploy macOS malware in fake job interview campaign

    Actors linked to North Korea bypassed Apple security using malware called FlexibleFerret.

    By Robert Wright, Contributing Reporter • Feb. 4, 2025
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall.
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip

    The cybersecurity outlook for 2025

    Threat actors are exploiting known weak points and enterprises’ dependency across the tech stack. It’s making cybersecurity professionals’ jobs harder than ever before. 

    By Cybersecurity Dive Staff • Feb. 3, 2025
  • A sign reading Food and Drug Administration is seen above a door to a government building.
    Image attribution tooltip
    Sarah Silbiger via Getty Images
    Image attribution tooltip

    FDA, CISA warn about vulnerabilities in patient health monitors

    Vulnerabilities in certain Contec and Epsimed patient monitors can allow people to gain access and potentially manipulate the devices, the FDA warned.

    By Nick Paul Taylor • Jan. 31, 2025