Vulnerability: Page 9


  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Most open source maintainers still consider themselves hobbyists, despite compensation pledges

    A study by Tidelift shows a compensation gap for the key producers of open source applications, raising questions about how to properly secure software supply chains.

    By May 2, 2023
  • ChatGPT on computer screen
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    OpenAI adds more data privacy guardrails for ChatGPT

    The company is allowing users to turn off chat history and export data as it seeks to reach enterprise customers.

    By Lindsey Wilkinson • April 26, 2023
  • Smiling businesswoman in headphones taking notes, working with laptop and talking smartphone, blue glowing information protection icons. Padlock, cloud and digital interface. Cyber security concept - stock photo
    Image attribution tooltip
    iStock via Getty Images
    Image attribution tooltip

    More than 2K organizations at risk of major attacks linked to SLP vulnerability

    Over 54,000 SLP-speaking instances and 670 product types are vulnerable, researchers from BitSight and Curesec found, including VMware ESXi Hypervisor. 

    By April 25, 2023
  • legal processes
    Image attribution tooltip
    Nico ElNino via Getty Images
    Image attribution tooltip

    Software industry leaders debate real costs and benefits of CISA security push

    The global effort to promote secure by design is seen as a potential game changer for software security, but may require substantial investments and considerable cultural changes.

    By April 14, 2023
  • CISA Director Jen Easterly talks with CEO George Kurtz during the CrowdStrike Government Summit.
    Image attribution tooltip
    Permission granted by CrowdStrike
    Image attribution tooltip

    CISA to unveil secure-by-design principles this week amid push for software security

    The Biden administration plans to shift responsibility for product safety to the tech industry. Stakeholder discussions are already underway.  

    By April 12, 2023
  • Double exposure shot of backside of a computer and red binary codes.
    Image attribution tooltip
    Suebsiri via Getty Images
    Image attribution tooltip

    Palo Alto security software stung by ransomware strain

    Check Point researchers say the “Rorschach” ransomware – found during an attack on a U.S. company – may be the fastest ever seen.

    By April 4, 2023
  • An IBM sign stands outside an IBM building in downtown Chicago, Illinois.
    Image attribution tooltip
    Tim Boyle / Staff via Getty Images
    Image attribution tooltip

    IBM file transfer service under active exploit, security researchers warn

    Ransomware groups are still exploiting a vulnerability in unpatched versions of Aspera Faspex almost four months after IBM issued a patch.

    By March 31, 2023
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Techa Tungateja via Getty Images
    Image attribution tooltip

    Outlook zero-day still vulnerable to attackers with prior access, researchers find

    Days after Microsoft issued a patch, researchers demonstrated that threat actors could still bypass the mitigation steps from within a network.

    By March 20, 2023
  • Smiling businesswoman in headphones taking notes, working with laptop and talking smartphone, blue glowing information protection icons. Padlock, cloud and digital interface. Cyber security concept - stock photo
    Image attribution tooltip
    iStock via Getty Images
    Image attribution tooltip

    Zero-days fell by one-third in 2022, Mandiant says

    Zero-day vulnerabilities in security, IT and network management products, which are consistently connected to the internet, claimed nearly 1 in 5 exploits.

    By March 20, 2023
  • The red lock and its structure explode in a digital computer setting.
    Image attribution tooltip
    TU IS via Getty Images
    Image attribution tooltip

    Outlook zero day linked to critical infrastructure attacks

    State-linked actors have targeted oil and gas, transportation and defense industries in Europe.

    By March 16, 2023
  • Futuristic electronic semiconductor and telecommunication network concept
    Image attribution tooltip
    Danai Jetawattana via Getty Images
    Image attribution tooltip

    CISA launches ransomware warning pilot for critical infrastructure providers

    The agency already warned dozens of organizations about ProxyNotShell.

    By March 14, 2023
  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    GitHub to begin rollout of 2FA security upgrade for developers

    The enhancement is part of a wider series of security measures following a series of malicious cyberattacks.

    By March 9, 2023
  • Bank sign on glass wall of business center
    Image attribution tooltip
    ultramarine5 via Getty Images
    Image attribution tooltip

    Cloud skills gap raises cyber concerns for banks

    As financial sector companies push forward with modernization, difficulty sourcing talent looms as a potential security risk.

    By Matt Ashare • March 7, 2023
  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard. Screens Show Coding Language User Interface.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Organizations tempt risk as they deploy code more frequently

    An imbalance between developers and security professionals on staff spotlights a disconnect between these business functions and objectives.

    By March 7, 2023
  • General Motors connected vehicle animation
    Image attribution tooltip
    Permission granted by General Motors
    Image attribution tooltip

    Who is liable for flawed software? New guidance upends the security standard

    Development practices and safe harbor provisions are the subject of major debate as work to implement the White Houses’ cyber strategy begins.

    By March 6, 2023
  • A long curved desk with banks of computer monitors mounted on the wall.
    Image attribution tooltip
    tonymelony via Getty Images
    Image attribution tooltip

    An ongoing SOC skills shortage could spell trouble for compliance

    Without skilled analysts to monitor the SOC, the risk of a successful cyberattack breaking through a company’s defenses grows. 

    By Sue Poremba • March 1, 2023
  • A photo illustration of LastPass logos on a hard drive disk held in someone's hand.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    LastPass compromise grew worse after DevOps engineer targeted for encryption key

    A threat actor used data from multiple breaches and a vulnerability on a high-level employee’s home computer to steal customer passwords.

    By Feb. 28, 2023
  • CISA Director Jen Easterly, RSA Conference 2022
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Google backs federal push for tech to embrace ‘secure by design’

    CISA has urged the technology industry to develop more resilient products before they reach customers.

    By Feb. 15, 2023
  • Technician services a cloud server.
    Image attribution tooltip
    anandaBGD via Getty Images
    Image attribution tooltip

    What’s known about the ESXiArgs ransomware hitting VMware servers

    An initial strain affected thousands of devices before a new variant emerged. The latest burst of attacks hit Saturday.

    By Feb. 15, 2023
  • Digital technology vector background depicting a cyberattack.
    Image attribution tooltip
    WhataWin via Getty Images
    Image attribution tooltip

    VMware ransomware was on the rise leading up to ESXiArgs spree, research finds

    Recorded Future analysis underscores a growing ransomware threat confronting organizations using VMware ESXi.

    By Feb. 13, 2023
  • Double exposure shot of backside of a computer and red binary codes.
    Image attribution tooltip
    Suebsiri via Getty Images
    Image attribution tooltip

    VMware ransomware evolves to evade data recovery, reinfects servers

    The new ESXiArgs strain has reinfected more than 1,150 VMware servers and represents more than 4 in 5 live infections, according to open-source ransomware data.

    By Feb. 10, 2023
  • Smiling businesswoman in headphones taking notes, working with laptop and talking smartphone, blue glowing information protection icons. Padlock, cloud and digital interface. Cyber security concept - stock photo
    Image attribution tooltip
    iStock via Getty Images
    Image attribution tooltip

    Unsophisticated ransomware campaign targeting VMware ripe for copycats

    Ransomware doesn’t typically hit thousands of potential victims at once. “All of it’s very strange,” one security researcher said.

    By Feb. 8, 2023
  • Person in hat surrounded by cameras at a press conference
    Image attribution tooltip

    Ross D. Franklin/AP

    Image attribution tooltip

    Sports betting apps fumble open source, placing users at risk

    On the cusp of Super Bowl 57, researchers from Synopsys warned popular mobile betting apps face a higher than average risk of being hacked.

    By Feb. 7, 2023
  • Ransomware spelled out in a creative depiction.
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Ransomware attack spree hits thousands of VMware servers

    Cyber authorities linked the attacks, dubbed ESXiArgs, to a two-year-old VMware vulnerability. At least 2,250 machines have been compromised.

    By Feb. 6, 2023
  • Young Woman Writing Code on Desktop Computer in Stylish Loft Apartment in the Evening.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    CVEs expected to rise in 2023, as organizations still struggle to patch

    Most CVEs are exploited within 30 days of public disclosure, a Coalition report found, spelling trouble for organizations trying to shore up their defenses.

    By Feb. 3, 2023