Vulnerability: Page 17


  • close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept - stock photo
    Image attribution tooltip
    Chainarong Prasertthai via Getty Images
    Image attribution tooltip

    Critical vulnerability surfaces in Apache Commons Text library

    Researchers warn an attacker can achieve remote code execution, but the vulnerability is not seen as potentially dangerous as Log4j.

    By Oct. 17, 2022
  • Digital code data numbers and secure lock icons on hacker's hands working with keyboard computer on dark blue tone background.
    Image attribution tooltip
    Techa Tungateja via Getty Images
    Image attribution tooltip

    Fortinet attacks escalate as company warns large swath of customers to upgrade

    The number of unique IPs using the exploit has gone from single digits when the vulnerability was originally announced to about 200. 

    By Oct. 17, 2022
  • Programming scripts on laptop monitor, unauthorized remote hacking of server
    Image attribution tooltip
    Motortion via Getty Images
    Image attribution tooltip

    CISA adds Fortinet CVE to vulnerability catalog after attacks escalate

    A critical authentication bypass vulnerability in the company’s firewall and web proxy software allowed unauthenticated attackers to gain access.

    By Oct. 12, 2022
  • A businessperson holding up a cybersecurity symbol
    Image attribution tooltip
    greenbutterfly via Getty Images
    Image attribution tooltip

    Microsoft struggles to mitigate Exchange Server CVEs as it races to complete patch

    Security researchers have repeatedly called out the company on interim measures that were quickly bypassed.

    By Oct. 6, 2022
  • A lit Microsoft log seen above a group of people in shadow.
    Image attribution tooltip
    Jeenah Moon via Getty Images
    Image attribution tooltip

    Microsoft updates guidance to prevent future Exchange server attacks

    The company had to revise some of its guidance involving the URL Rewrite rule, while organizations continue to wait for a patch.

    By Oct. 5, 2022
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA orders federal IT overhaul with automated asset inventory, software scanning

    Civilian agencies will be required to check for vulnerabilities in a push to gain better visibility into IT networks.

    By Oct. 4, 2022
  • Picture of a cybersecurity lock
    Image attribution tooltip
    iStock via Getty Images
    Image attribution tooltip

    Microsoft warns of potential escalation for Exchange server zero days

    The actor, which Microsoft says is state sponsored, installed Chopper web shells to gain hands-on-keyboard access, conduct Active Directory reconnaissance and exfiltrate data. 

    By Oct. 3, 2022
  • A picture of the Microsoft campus in Redmond, Washington.
    Image attribution tooltip
    Stephen Brashear/Stringer via Getty Images
    Image attribution tooltip

    Microsoft investigating 2 zero-day vulnerabilities in Exchange Server

    One vulnerability is a server-side request forgery, while the second allows remote-code execution when an attacker has access to PowerShell. 

    By Sept. 30, 2022
  • Technologist shows two customers how to use enterprise software at desktop computer
    Image attribution tooltip
    gilaxia via Getty Images
    Image attribution tooltip

    Strict security rules could push open source community out of federal work, expert says

    Agency CISOs and development experts say federal agencies need to work collaboratively with open source community contributors.

    By Sept. 27, 2022
  • Concept with expert setting up automated software on laptop computer.
    Image attribution tooltip
    NicoElNino via Getty Images
    Image attribution tooltip

    Organizations rapidly shift tactics to secure the software supply chain

    Synopsys’ 13th annual BSIMM study shows rapid increases in automation and use of SBOMs among software producers and other organizations.

    By Sept. 22, 2022
  • An image of the White House.
    Image attribution tooltip
    Vacclav/iStock via Getty Images
    Image attribution tooltip

    White House guidance on third-party software seen as a major test of cyber risk strategy

    The U.S. hopes that by forcing software producers to meet a set of minimum security standards for federal use, a new baseline strategy will be adopted industrywide. 

    By Sept. 19, 2022
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Techa Tungateja via Getty Images
    Image attribution tooltip

    Researchers warn older D-Link routers are under threat from Mirai malware variant

    Attackers are leveraging vulnerabilities in the devices to build botnets and launch DDoS attacks, according to Palo Alto Networks research.

    By Sept. 8, 2022
  • Two people sitting on a stage during a conference, with a U.S. flag in the background.
    Image attribution tooltip
    Permission granted by Billington CyberSecurity
    Image attribution tooltip

    CISA Director: Tech industry should infuse security at product design stage

    Agency director Jen Easterly outlined a push for faster incident reporting and closer industry collaboration.

    By Sept. 7, 2022
  • Concept with expert setting up automated software on laptop computer.
    Image attribution tooltip
    NicoElNino via Getty Images
    Image attribution tooltip

    Feds push for developers to take lead in securing software supply chain

    The guidelines from CISA and the NSA come amid a growing movement to “shift left” and evaluate software security earlier in the development cycle. 

    By Sept. 2, 2022
  • close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept - stock photo
    Image attribution tooltip
    Chainarong Prasertthai via Getty Images
    Image attribution tooltip

    SaaS sprawl amps up security challenges amid heightened risk

    Two-thirds of businesses say they're spending more on SaaS applications year over year, Axonius data shows.

    By Roberto Torres • Sept. 1, 2022
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    Growing cyber risks add to hospital cost squeeze, Fitch cautions

    Cyber risk mitigation is becoming more expensive, but with hospitals' cost pressures mounting, spending on security may not be a priority, the ratings agency said.

    By Susan Kelly • Aug. 31, 2022
  • A screen with the Slack logo on the trading floor of the New York Stock Exchange.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Slack enhances platform security amid rapid expansion and heightened risk

    The enterprise messaging platform has faced increased customer concerns about security and privacy.

    By Aug. 31, 2022
  • Google logo displayed outside the company's New York City office.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Google tackles open source security with vulnerability rewards program

    The program follows a surge in supply chain attacks impacting the open source software ecosystem.

    By Aug. 30, 2022
  • Woman Walking On Staircase Of Building
    Image attribution tooltip
    Ceres Van Hal / EyeEm via Getty Images
    Image attribution tooltip
    Sponsored by Delinea

    How does Privileged Access Management work?

    The model is a framework to help you set the right PAM foundation and get your organization on the PAM journey, now and in the future.

    Aug. 29, 2022
  • A Cisco logo with blue lights strands in the background.
    Image attribution tooltip
    David Ramos via Getty Images
    Image attribution tooltip

    Researchers say Cisco firewall software remains vulnerable to attack despite patch

    Rapid7 researchers also warn only a very small percentage of users have applied updates.

    By Aug. 26, 2022
  • Programming scripts on laptop monitor, unauthorized remote hacking of server
    Image attribution tooltip
    Motortion via Getty Images
    Image attribution tooltip

    Threat actors again target critical SAP ICMAD vulnerabilities

    CISA added the most critical SAP vulnerability to its Known Exploited Vulnerabilities Catalog last week.

    By Aug. 23, 2022
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Techa Tungateja via Getty Images
    Image attribution tooltip

    Media companies at high risk of malicious cyberattack: Report

    The media industry is highly dependent on third-party vendor relationships and is often slow to respond to vulnerabilities, BlueVoyant research found.

    By Aug. 22, 2022
  • A group of co-workers surround a computer screen
    Image attribution tooltip
    Yuri Arcurs via Getty Images
    Image attribution tooltip

    DigitalOcean, caught in Mailchimp security incident, drops email vendor

    An attack on the email marketing firm raises questions about the continued risk of a supply chain compromise. 

    By Aug. 17, 2022
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Traitov/iStock/Getty via Getty Images
    Image attribution tooltip

    The same old problems nag cybersecurity professionals

    Technical complexities abound as the perceived level of risk rises in an unrelenting fashion.

    By Aug. 17, 2022
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Techa Tungateja via Getty Images
    Image attribution tooltip

    How attackers are breaking into organizations

    Threat actors lean heavily on phishing attacks, vulnerabilities in software and containers, and stolen credentials, according to top cyber vendor research.

    By Aug. 15, 2022