Vulnerability: Page 15


  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    Log4j: What we know (and what's yet to come)

    The vulnerability has upended federal officials and the infosec industry, putting hundreds of millions of devices and systems at risk. 

    By Dec. 17, 2021
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Log4j attacks poised to rise as threat actors search for attack vectors

    Microsoft warns that threat actors are using third-party hosted Minecraft servers to launch ransomware attacks. The company also warned that access brokers are getting into the game.

    By Dec. 16, 2021
  • A man faces multiple computer screens.
    Image attribution tooltip
    South_agency via Getty Images
    Image attribution tooltip

    Security teams prepare for the yearslong threat Log4j poses

    Industry is still investigating the full extent of the vulnerability, which limits the actions security teams can immediately take. 

    By Samantha Schwartz • Dec. 16, 2021
  • Dozens of lines of computer code on a monitor.
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    Log4j threat expands as second vulnerability emerges and nation states pounce

    Early stage ransomware attempts are underway and federal officials are urging organizations to take immediate steps to protect IT systems.

    By Dec. 15, 2021
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    Log4j under siege, millions of devices vulnerable

    Technology firms are scrambling to investigate and patch their systems amid reports of more than 800,000 attempted attacks.

    By Dec. 14, 2021
  • A single opened padlock glows red among rows of closed blue padlocks.
    Image attribution tooltip
    JuSun via Getty Images
    Image attribution tooltip

    Federal authorities, technology vendors race to contain Log4j vulnerability

    The vulnerability is considered to be among the most dangerous over the past decade, according to security researchers.

    By Dec. 13, 2021
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Traitov/iStock/Getty via Getty Images
    Image attribution tooltip

    Is the security of legacy IT providers prompting a confidence crisis?

    Research commissioned by CrowdStrike found security professionals are losing confidence in providers like Microsoft amid the rise in supply chain attacks. Microsoft has thoughts. 

    By Dec. 8, 2021
  • Image depicts the implementation of cybersecurity with a lock displayed over a screen.
    Image attribution tooltip
    anyaberkut via Getty Images
    Image attribution tooltip

    Tech adoption makes construction industry top target for cyberattacks

    Companies like Shawmut emphasize strengthening security, as a new report finds that contractors are at high risk for ransomware and other threats.

    By Sebastian Obando • Dec. 2, 2021
  • Close up stock photograph of a mature man working with a large computer screen. He’s working with 3D software examining complicated shapes.
    Image attribution tooltip
    Laurence Dutton via Getty Images
    Image attribution tooltip

    Gartner guidance moves away from prioritizing critical CVEs, focuses on exploitability

    The analyst firm joined CISA in rethinking CVEs. Focusing on actively exploited vulnerabilities will exponentially improve security, a Gartner analyst said. 

    By Samantha Schwartz • Nov. 18, 2021
  • A man looks at lines of code depicted on a computer screen
    Image attribution tooltip
    sestovic via Getty Images
    Image attribution tooltip

    30K Microsoft Exchange Servers remain vulnerable to new tactics

    Organizations have failed to patch widely exploited vulnerabilities, though patches were made available in the spring, Mandiant researchers found.

    By Nov. 18, 2021
  • Laptop
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    A year after SolarWinds, third-party risk still threatens the software supply chain

    Digital transformation requirements have pressured organizations to introduce risk into their environments through open source or commercially available software.

    By Nov. 12, 2021
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA's vulnerability catalog is nice to have. But will it change how companies patch?

    The agency is encouraging private entities and local governments to monitor the catalog, though its usefulness will depend on a company's resources.

    By Samantha Schwartz • Nov. 8, 2021
  • Image attribution tooltip
    Ian Forsyth / Stringer via Getty Images
    Image attribution tooltip

    Better security, access policies can combat cloud misconfigurations

    Data disclosures from cloud misconfigurations are often the result of human error — but policies, not users, are to blame.  

    By Brian Eastwood • Nov. 4, 2021
  • Image attribution tooltip
    Kevin Dietsch / Staff via Getty Images
    Image attribution tooltip

    CISA overhauls vulnerability management, focuses on CVEs under active exploit

    The order is directed at all federal civilian agencies, "however, all organizations should adopt this directive and prioritize mitigating vulnerabilities listed on our public catalog," CISA Director Jen Easterly said.

    By Samantha Schwartz • Nov. 3, 2021
  • Image attribution tooltip
    Bethany Clarke via Getty Images
    Image attribution tooltip

    Twitter eyes phishing deterrence with security key rollout

    The employee multifactor upgrade follows a high-profile attack against celebrity users in 2020, but the social media company says improvements are still needed. 

    By Oct. 29, 2021
  • A woman sitting by her laptop with a clothes rack in the background. SHe is behind a mirror wall.
    Image attribution tooltip

    stock.adobe.com/JacobLund

    Image attribution tooltip
    Sponsored by Cybersource

    How businesses are tackling fraud in a digital-first reality

    With digital transactions and eCommerce continuing to grow in volume, successfully taking on fraud will require businesses to explore and rely on new tools and technologies.

    Oct. 25, 2021
  • Image attribution tooltip
    Patrick Lux via Getty Images
    Image attribution tooltip

    Supply chain attacks lift debate on how to manage software vulnerabilities

    Researchers and developers dispute where responsibilities lie for early detection and how to manage disclosure to customers. The disagreement can allow vulnerabilities to linger. 

    By Oct. 21, 2021
  • Image attribution tooltip
    Carl Court via Getty Images
    Image attribution tooltip

    Users have bad security habits. What can businesses do?

    "As strange as it sounds, in the case of a security incident in the enterprise, you can't blame the user," Bitdefender's Alex "Jay" Balan said. 

    By Samantha Schwartz • Oct. 14, 2021
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Top global companies falling short in protecting domain security

    Major brands leave themselves and their customers open to phishing attacks, ransomware and BEC due to inadequate measures.

    By Oct. 5, 2021
  • Image attribution tooltip
    David Ramos via Getty Images
    Image attribution tooltip

    Threat actors more frequently — and successfully — target Active Directory

    Attacks on AD played a prominent role during the high-profile SolarWinds campaign and LockBit 2.0 ransomware attacks.

    By Sept. 30, 2021
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Traitov/iStock/Getty via Getty Images
    Image attribution tooltip

    Timely patching remains pain point as high-profile bugs linger

    Patches interfering with business productivity are more of a challenge for security teams. 

    By Samantha Schwartz • Sept. 29, 2021
  • software, code, computer
    Image attribution tooltip

    Markus Spiske

    Image attribution tooltip

    How hackers are making the leap from cloud to the software build processes

    The security problem with third-party container applications is not, however, indicative of infrastructure flaws.

    By Samantha Schwartz • Sept. 28, 2021
  • Image attribution tooltip
    Patrick Lux via Getty Images
    Image attribution tooltip

    Is there too much transparency in cybersecurity?

    Between information sharing, software accountability, or incident response and disclosures, companies have to find the disclosure sweet spot.

    By Samantha Schwartz • Sept. 21, 2021
  • Closeup side view of group of mid 20's mobile application developers testing the code and fixing the issues.
    Image attribution tooltip
    gilaxia via Getty Images
    Image attribution tooltip

    Executives fail to make software supply chain security a priority, report finds

    The disconnect between rhetoric and performance in the software development and security industries are part of an internal debate: Which sector should take the lead?

    By Sept. 14, 2021
  • Image attribution tooltip

     istock: ArthurHidden

    Image attribution tooltip
    Sponsored by Code42

    The Great Resignation and the risk of data loss

    The Great Resignation is upon us and with it comes data loss.

    Sept. 13, 2021