Vulnerability: Page 2
-
Critical CVE in 4 Fortinet products actively exploited
CISA added the format string vulnerability to its known exploited vulnerabilities catalog last week, months after it was first disclosed by the company.
By David Jones • Oct. 14, 2024 -
CISA’s vulnerability management program spotted 250 critical CVEs in 2023
The 51 federal civilian agencies involved in the program remediated 872 vulnerabilities last year, up 78% increase from 2022, according to CISA.
By Matt Kapko • Oct. 4, 2024 -
Ivanti up against another attack spree as hackers target its endpoint manager
Ivanti customers are facing a new series of exploitation attempts after the company pledged in April to launch a comprehensive overhaul of its internal security practices.
By David Jones • Oct. 3, 2024 -
CUPS vulnerability, a near miss, delivers another warning for open source
While a major crisis was averted, the disclosures may open up needed conversations about transparency and coordination, according to researchers.
By David Jones • Sept. 30, 2024 -
A quartet of Linux CVEs draws exploit fears among open source community
Attackers can use the chained vulnerabilities to execute remote commands after a user initiates a print job.
By David Jones • Sept. 27, 2024 -
CISA catalog falls short on CVEs targeted by Flax Typhoon
A report by VulnCheck highlights the ongoing backlog in identifying active exploitation of CVEs.
By David Jones • Sept. 24, 2024 -
Attackers exploit second Ivanti Cloud Service Appliance flaw for more access
Hackers are exploiting the vulnerability in tandem with a previously disclosed CVE, to bypass authentication measures and take control of an affected system.
By David Jones • Sept. 20, 2024 -
Valid accounts remain top access point for critical infrastructure attacks, officials say
CISA attributed 2 in 5 successful intrusions to valid account abuse last year, but that is down from 2022.
By Matt Kapko • Sept. 17, 2024 -
Hackers exploit CVE in older versions of Ivanti Cloud Service Appliance
Version 4.6 has reached end of life and the company is urging customers to upgrade to version 5.0 to receive support.
By David Jones • Sept. 16, 2024 -
Sponsored by Code42, now a part of Mimecast
Keeping data secure in the age of generative AI
Generative AI is reshaping industries, but with innovation comes new data security challenges. Are your cybersecurity practices keeping up?
By Rob Juncker, CTO of Code42, now part of Mimecast • Sept. 16, 2024 -
Microsoft, working with security partners, pledges better deployment, testing collaboration
Following a summit with U.S. and European partners, the company is working to build additional resiliency features to prevent a repeat of the historic global IT outage linked to CrowdStrike.
By David Jones • Updated Sept. 13, 2024 -
Most OT environments have at least 4 remote access tools, report finds
Claroty warned the prevalence of remote access tool sprawl, often linked to ransomware, raises the risk of malicious activity.
By David Jones • Sept. 12, 2024 -
How to manage the rising tide of CVEs
As the volume and complexity of vulnerabilities grows, organizations are struggling to manage and mitigate the security defects.
By Rosalyn Page • Sept. 11, 2024 -
SonicWall firewall CVE exploits linked to ransomware attacks
Active exploits aimed at firewalls mark yet another string of attacks targeting devices with high-value initial access, researchers said.
By Matt Kapko • Sept. 10, 2024 -
Feds warn of broad Russia-linked CVE exploits targeting critical infrastructure
Attackers operating under the direction of Russia’s military intelligence service are targeting governments, finance, transportation, energy and healthcare.
By Matt Kapko • Sept. 6, 2024 -
Volt Typhoon exploiting zero-day in campaign targeting ISPs, MSPs
Researchers from Black Lotus Labs warn the state-linked adversary is exploiting a vulnerability in Versa Director using custom web shells against the telecom sector.
By David Jones • Aug. 28, 2024 -
CISA warns of active exploits hitting popular CI/CD tool Jenkins
Researchers at CloudSEK and Juniper Networks said a ransomware group targeted Brontoo Technology Solutions by exploiting the critical CVE. The attack disrupted banks in India.
By Matt Kapko • Aug. 20, 2024 -
SolarWinds Web Help Desk CVE scores a 9.8
SolarWinds urged customers to patch the vulnerability that could allow an attacker to run commands on a host machine, while CISA added the CVE to its KEV catalog.
By David Jones • Aug. 16, 2024 -
Microsoft Windows CVE triggers blue screen of death, researchers find
Researchers from Fortra on Monday disclosed the flaw in the common log file system, which can lead to repeated crashes and potential data loss.
By David Jones • Updated Aug. 13, 2024 -
Attackers target legacy Cisco Smart Install features
Thousands of Cisco Smart Install IPs remain exposed to the internet as CISA warns that organizations are still employing weak passwords.
By David Jones • Aug. 12, 2024 -
CrowdStrike pursuing deal to buy patch management specialist Action1
The security firm is still working to overhaul its internal software development practices following the July 19 global IT outage involving millions of Microsoft Windows devices.
By David Jones • Aug. 9, 2024 -
CrowdStrike outage renews supply chain concerns, federal officials say
The White House and the U.S. Government Accountability Office are raising questions about the resilience of the software supply chain and memory safety vulnerabilities.
By David Jones • Aug. 2, 2024 -
Nearly 1 in 3 software development professionals unaware of secure practices
The knowledge gap, identified in a Linux Foundation report, comes as malicious hackers increasingly target critical vulnerabilities.
By David Jones • July 16, 2024 -
CISA calls for elimination of OS command injection vulnerabilities
Threat groups target vulnerabilities in widely used network devices. CISA’s latest advisory urges software makers to eliminate them at the source.
By Matt Kapko • July 11, 2024 -
MOVEit legal liabilities, expenses pile up for Progress Software
The prospective financial hit from a widely exploited vulnerability in the file-transfer service is growing. Progress confronts lawsuits, regulator scrutiny and government investigations.
By Matt Kapko • July 10, 2024