Vulnerability


  • An array of solar panels stands on a farm
    Image attribution tooltip
    Robert Nickelsberg via Getty Images
    Image attribution tooltip

    Solar power gear vulnerable to remote sabotage

    Security flaws underscore the risk of cyber threat actors commandeering parts of the electric grid.

    By Eric Geller, Contributing Reporter • March 28, 2025
  • Oracle's Silicon Valley corporate headquarters in Redwood, California pictured on September 9, 2019.
    Image attribution tooltip
    Sundry Photography via Getty Images
    Image attribution tooltip

    Threat actor in Oracle Cloud breach may have gained access to production environments

    Researchers from CloudSEK are analyzing a data sample from a threat actor that claimed a massive breach involving 6 million records. 

    By March 27, 2025
  • New generation internet technologies and security bug.
    Image attribution tooltip
    Devrimb
    Image attribution tooltip

    DrayTek routers face active exploitation of older vulnerabilities

    The company’s devices are also randomly rebooting in connection with additional CVEs disclosed earlier this month.

    By March 26, 2025
  • Microsoft building with logo
    Image attribution tooltip
    HJBC via Getty Images
    Image attribution tooltip

    Russian threat actor weaponized Microsoft Management Console flaw

    A threat actor known as “EncryptHub” began exploiting the zero-day vulnerability before it was patched earlier this month.

    By Elizabeth Montalbano, Contributing Reporter • Updated March 26, 2025
  • Cloud Network Solution digital background. Cyber Security and Cloud Technology Concept
    Image attribution tooltip
    da-kuk via Getty Images
    Image attribution tooltip

    Critical vulnerabilities put Kubernetes environments in jeopardy

    Wiz researchers warned that several CVEs in Ingress NGINX Controller for Kubernetes make nearly half of all cloud environments at risk of takeover.

    By Updated March 25, 2025
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    Critical Apache Tomcat RCE vulnerability exploited

    Attack attempts via CVE-2025-24813 are underway, but successful attacks require specific, non-default configurations, according to GreyNoise.

    By March 24, 2025
  • Cybersecurity Challenges in Remote Work, exploring vulnerabilities, evolving threats, employee awareness, digital transformation impacts
    Image attribution tooltip

    stock.adobe.com/peera

    Image attribution tooltip
    Sponsored by Veracode

    How ASPM gives you control over complex architectures

    ASPM gives organizations control by unifying risk data, automating threat analysis, and prioritizing vulnerabilities based on their business impact.

    By Sohail Iqbal, Chief Information Security Officer, Veracode • March 24, 2025
  • Coinbase
    Image attribution tooltip
    Courtesy of Coinbase
    Image attribution tooltip

    Coinbase originally targeted during GitHub Action supply chain attack

    Researchers from Palo Alto Networks said the hackers likely planned to leverage an open source project of the company for additional attacks.

    By March 21, 2025
  • closeup of hands on a keyboard, software code featured in the screen
    Image attribution tooltip
    scyther5 via Getty Images
    Image attribution tooltip

    GitHub Action compromise linked to previously undisclosed attack

    Researchers uncovered a March 11 incident that may have led to the larger supply chain attack.  

    By March 20, 2025
  • Digital technology vector background depicting a cyberattack.
    Image attribution tooltip
    WhataWin via Getty Images
    Image attribution tooltip

    Cisco Smart Licensing Utility flaws under attack

    The SANS Internet Storm Center reported exploitation attempts against two critical vulnerabilities, which were initially disclosed in September.

    By March 20, 2025
  • Microsoft, antitrust, Alaily, FTC. Google
    Image attribution tooltip
    David Ramos via Getty Images
    Image attribution tooltip

    11 nation-state groups exploit unpatched Microsoft zero-day

    The tech giant has yet to address a vulnerability that allows for malicious payloads to be delivered via Windows shortcut files and has been under active attack for eight years.

    By Elizabeth Montalbano, Contributing Reporter • March 19, 2025
  • Dozens of lines of computer code on a monitor.
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    AI project failure rates are on the rise: report

    The share of businesses scrapping most of their AI initiatives increased to 42% this year, up from 17% last year, according to S&P Global Market Intelligence. 

    By Lindsey Wilkinson • March 18, 2025
  • A tech worker eviews code on a computer screen
    Image attribution tooltip
    MTStock Studio via Getty Images
    Image attribution tooltip

    Supply chain attack against GitHub Action triggers massive exposure of secrets

    The incident highlights ongoing security concerns in the software supply chain.

    By March 17, 2025
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    SuperBlack ransomware used to exploit Fortinet vulnerabilities

    A report by Forescout Research points to a threat actor with ties to LockBit.

    By March 14, 2025
  • A person types on a laptop in a dark room.
    Image attribution tooltip
    jariyawat thinsandee via Getty Images
    Image attribution tooltip

    Juniper MX routers targeted by China-nexus threat group using custom backdoors

    The devices have reached end-of-life status and need to be upgraded, as the company has issued in a security advisory.

    By March 12, 2025
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA: 3 Ivanti endpoint vulnerabilities exploited in the wild

    Researchers last month published a proof-of-concept exploit for the critical flaws in Endpoint Manager.

    By March 11, 2025
  • Digital technology vector background depicting a cyberattack.
    Image attribution tooltip
    WhataWin via Getty Images
    Image attribution tooltip

    Critical PHP vulnerability under widespread cyberattack

    Telemetry data shows spikes in exploits of CVE-2024-4577 across several countries in recent months.

    By March 10, 2025
  • Close-up Portrait of Software Engineer Working on Computer, Line of Code Reflecting in Glasses.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Eleven11bot estimates revised downward as researchers point to Mirai variant

    The botnet has been involved in DDoS activity targeting telecom companies and gaming platforms.

    By March 7, 2025
  • Technician services a cloud server.
    Image attribution tooltip
    anandaBGD via Getty Images
    Image attribution tooltip

    37K+ VMware ESXi instances vulnerable to critical zero-day

    Some customers have been unable to download the patches for three VMware zero-day vulnerabilities due to an issue with the Broadcom Support Portal.

    By March 6, 2025
  • A sign is posted in front of a Broadcom office on December 12, 2024 in San Jose, California.
    Image attribution tooltip
    Justin Sullivan / Staff via Getty Images
    Image attribution tooltip

    Broadcom urges customers to patch 3 zero-day VMware flaws

    Cyberattackers with administrative access are actively exploiting vulnerabilities in ESXi, Workstation and Fusion products.

    By Elizabeth Montalbano, Contributing Reporter • March 5, 2025
  • words zero day highlighted in code
    Image attribution tooltip
    JUN LI via Getty Images
    Image attribution tooltip

    Microsoft-signed driver used in ransomware attacks

    Threat actors are exploiting a privilege escalation flaw in Paragon Partition Manager for “bring your own vulnerable driver” (BYOVD) attacks.

    By March 3, 2025
  • exclamation point depicted hovering above network infrastructure
    Image attribution tooltip
    Just_Super/Getty Images via Getty Images
    Image attribution tooltip

    Leaked ransomware chat logs reveal Black Basta’s targeted CVEs

    Cybercrime group focused on Microsoft vulnerabilities as well as flaws in network edge devices and communications software.

    By Feb. 27, 2025
  • A closeup shot of long colorful lines of code on a computer screen.
    Image attribution tooltip
    Wirestock via Getty Images
    Image attribution tooltip

    Nearly 3K Ivanti Connect Secure instances vulnerable to critical flaw

    U.S. has the most VPNs not yet patched for CVE-2025-22467.

    By Feb. 26, 2025
  • Programming scripts on laptop monitor, unauthorized remote hacking of server
    Image attribution tooltip
    Motortion via Getty Images
    Image attribution tooltip

    More than 400 SonicWall firewall instances remain vulnerable to attack

    Researchers previously warned of exploitation attempts after the release of a proof of concept.

    By Feb. 25, 2025
  • The red lock and its structure explode in a digital computer setting.
    Image attribution tooltip
    TU IS via Getty Images
    Image attribution tooltip

    Attackers exploiting Cisco vulnerabilities tied to Salt Typhoon campaign

    GreyNoise observed exploitation of CVE-2018-0171, which Cisco Talos researchers said was used in a recent attack by the China-backed threat group.

    By Feb. 25, 2025