Vulnerability
-
Poor vulnerability management could indicate larger cyber governance issues, S&P says
Companies that fail to properly mitigate security vulnerabilities are leaving themselves open to malicious activity, the research firm said.
By David Jones • Oct. 29, 2024 -
Cisco warns actively exploited CVE can lead to DoS attacks against VPN services
The company warned the threat activity is linked to previously disclosed brute-force attacks beginning in March.
By David Jones • Oct. 28, 2024 -
Critical Veeam CVE actively exploited in ransomware attacks
Multiple ransomware groups targeted the vulnerability, which has a CVSS score of 9.8, more than a month after it was disclosed and patched by the data backup and recovery vendor.
By Matt Kapko • Oct. 22, 2024 -
Microsoft confirms partial loss of security log data on multiple platforms
The company previously expanded free access to security logs on several platforms, including Purview, following the 2023 state-linked hack of Exchange Online.
By David Jones • Oct. 18, 2024 -
FBI, CISA seek input on software security, configuration changes
Authorities are seeking public comment on steps the software industry can take to make their products more resistant to malicious threat activity.
By David Jones • Oct. 17, 2024 -
CISA adds SolarWinds flaw to exploited vulnerabilities catalog
A hardcoded credentials vulnerability in SolarWinds Web Help Desk lets attackers read and modify sensitive help desk ticket information.
By David Jones • Oct. 16, 2024 -
Critical CVE in 4 Fortinet products actively exploited
CISA added the format string vulnerability to its known exploited vulnerabilities catalog last week, months after it was first disclosed by the company.
By David Jones • Oct. 14, 2024 -
CISA’s vulnerability management program spotted 250 critical CVEs in 2023
The 51 federal civilian agencies involved in the program remediated 872 vulnerabilities last year, up 78% increase from 2022, according to CISA.
By Matt Kapko • Oct. 4, 2024 -
Ivanti up against another attack spree as hackers target its endpoint manager
Ivanti customers are facing a new series of exploitation attempts after the company pledged in April to launch a comprehensive overhaul of its internal security practices.
By David Jones • Oct. 3, 2024 -
CUPS vulnerability, a near miss, delivers another warning for open source
While a major crisis was averted, the disclosures may open up needed conversations about transparency and coordination, according to researchers.
By David Jones • Sept. 30, 2024 -
A quartet of Linux CVEs draws exploit fears among open source community
Attackers can use the chained vulnerabilities to execute remote commands after a user initiates a print job.
By David Jones • Sept. 27, 2024 -
CISA catalog falls short on CVEs targeted by Flax Typhoon
A report by VulnCheck highlights the ongoing backlog in identifying active exploitation of CVEs.
By David Jones • Sept. 24, 2024 -
Attackers exploit second Ivanti Cloud Service Appliance flaw for more access
Hackers are exploiting the vulnerability in tandem with a previously disclosed CVE, to bypass authentication measures and take control of an affected system.
By David Jones • Sept. 20, 2024 -
Valid accounts remain top access point for critical infrastructure attacks, officials say
CISA attributed 2 in 5 successful intrusions to valid account abuse last year, but that is down from 2022.
By Matt Kapko • Sept. 17, 2024 -
Hackers exploit CVE in older versions of Ivanti Cloud Service Appliance
Version 4.6 has reached end of life and the company is urging customers to upgrade to version 5.0 to receive support.
By David Jones • Sept. 16, 2024 -
Sponsored by Code42, now a part of Mimecast
Keeping data secure in the age of generative AI
Generative AI is reshaping industries, but with innovation comes new data security challenges. Are your cybersecurity practices keeping up?
By Rob Juncker, CTO of Code42, now part of Mimecast • Sept. 16, 2024 -
Microsoft, working with security partners, pledges better deployment, testing collaboration
Following a summit with U.S. and European partners, the company is working to build additional resiliency features to prevent a repeat of the historic global IT outage linked to CrowdStrike.
By David Jones • Updated Sept. 13, 2024 -
Most OT environments have at least 4 remote access tools, report finds
Claroty warned the prevalence of remote access tool sprawl, often linked to ransomware, raises the risk of malicious activity.
By David Jones • Sept. 12, 2024 -
How to manage the rising tide of CVEs
As the volume and complexity of vulnerabilities grows, organizations are struggling to manage and mitigate the security defects.
By Rosalyn Page • Sept. 11, 2024 -
SonicWall firewall CVE exploits linked to ransomware attacks
Active exploits aimed at firewalls mark yet another string of attacks targeting devices with high-value initial access, researchers said.
By Matt Kapko • Sept. 10, 2024 -
Feds warn of broad Russia-linked CVE exploits targeting critical infrastructure
Attackers operating under the direction of Russia’s military intelligence service are targeting governments, finance, transportation, energy and healthcare.
By Matt Kapko • Sept. 6, 2024 -
Volt Typhoon exploiting zero-day in campaign targeting ISPs, MSPs
Researchers from Black Lotus Labs warn the state-linked adversary is exploiting a vulnerability in Versa Director using custom web shells against the telecom sector.
By David Jones • Aug. 28, 2024 -
CISA warns of active exploits hitting popular CI/CD tool Jenkins
Researchers at CloudSEK and Juniper Networks said a ransomware group targeted Brontoo Technology Solutions by exploiting the critical CVE. The attack disrupted banks in India.
By Matt Kapko • Aug. 20, 2024 -
SolarWinds Web Help Desk CVE scores a 9.8
SolarWinds urged customers to patch the vulnerability that could allow an attacker to run commands on a host machine, while CISA added the CVE to its KEV catalog.
By David Jones • Aug. 16, 2024 -
Microsoft Windows CVE triggers blue screen of death, researchers find
Researchers from Fortra on Monday disclosed the flaw in the common log file system, which can lead to repeated crashes and potential data loss.
By David Jones • Updated Aug. 13, 2024