Top

Tag: vulnerabilities


Cybersecurity

Misconfiguration and vulnerabilities biggest risks in cloud security: Report

February 1, 2023

Via: CSO Online

The two biggest cloud security risks continue to be misconfigurations and vulnerabilities, which are being introduced in greater numbers through software supply chains, according to a report by Sysdig. While zero trust is a top priority, data showed that least […]


IT Policy, Tech

CISA’s Strategic Plan Is Ushering in a New Cybersecurity Era

November 29, 2022

Via: Dark Reading

The federal government has once again signaled that our traditional approach to cybersecurity, one predicated solely on prevention and perimeter defenses, is failing us. In the past two years alone, 76% of organizations were attacked by ransomware, and 66% experienced […]


Cybersecurity

Chinese Hackers Target Energy Sector in Australia, South China Sea

August 30, 2022

Via: Dark Reading

The Chinese state-aligned threat actor TA423 (aka Leviathan/APT40) is behind a sustained cyber-espionage campaign against countries and entities operating in the South China Sea, including organizations involved in an offshore wind farm in the Taiwan Strait. The threat actor’s most […]


Cybersecurity

Pipeline Operators Are Headed in the Right Direction, With or Without TSA’s Updated Security Directives

August 8, 2022

Via: Dark Reading

Following the Colonial Pipeline hack — one of the highest-profile attacks against US critical infrastructure to date — in 2021, the Department of Homeland Security’s Transportation Security Administration (TSA) released two unprecedented Security Directives, requiring owners and operators of gas […]


Cybersecurity

Some QCT servers vulnerable to ‘Pantsdown’ flaw say security researchers

May 26, 2022

Via: ZDnet

Researchers have disclosed the existence of the critical “Pantsdown” vulnerability in some Quanta Cloud Technology (QCT) server models. On Thursday, cybersecurity firm Eclypsium said that several servers belonging to the data center solutions provider were still vulnerable to the bug, […]


Cybersecurity

With war next door, EU is warned on cybersecurity gaps

March 29, 2022

Via: Federal News Network

As Russia’s invasion of Ukraine accelerates European Union defense cooperation, a watchdog said Tuesday that EU institutions face vulnerabilities on another front: cybersecurity. The warning by the European Court of Auditors covers the wide range of EU bodies — from […]


Cybersecurity

Log4j and Livestock Apps: APT41 Wages Persistent Cyberattack Campaign on US Government

March 10, 2022

Via: Dark Reading

A months-long malicious campaign that targeted multiple US government agencies has once again highlighted the sophistication and dogged persistence of APT41, a China-backed threat actor associated with numerous cyber-espionage campaigns in recent years. Researchers at Mandiant first spotted the campaign […]


Cybersecurity

How attackers sidestep the cyber kill chain

March 7, 2022

Via: CSO Online

The idea of the cyber kill chain was first developed by Lockheed Martin more than a decade ago. The basic idea is that attackers perform reconnaissance, find vulnerabilities, get malware into victim systems, connect to a command-and-control (C2) server, move […]


Cybersecurity, Education, Industry

Education sector hounded by cyberattacks in 2021

January 24, 2022

Via: CSO Online

Education and research were the top targets for cyberattackers in 2021, with an average of 1605 attacks per organization per week, a 75% increase from 2020, according to research by Check Point Software Technologies. Pandemic’s push for digital invites threats […]


Cybersecurity

FTC, SEC raise legal risks surrounding the log4j flaw

January 10, 2022

Via: CSO Online

Last week, the U.S. Federal Trade Commission (FTC) issued a warning to companies to remediate the serious vulnerability in the popular open-source Java logging package Log4j to avoid future legal action. In issuing its notice, the FTC underscored that organizations […]


Cybersecurity

An Adaptive Security Strategy Is Critical for Stopping Advanced Attacks

December 28, 2021

Via: Dark Reading

Security operation centers (SOCs) are encountering threats that quickly swivel from a hands-on keyboard attack to a wide-scale and destructive ransomware attack, or even a complex nation-state attack. Current triage and remediation by alert will likely fail in such situations. […]


Cybersecurity

Second Log4j vulnerability carries denial-of-service threat, new patch available

December 16, 2021

Via: CSO Online

A second vulnerability impacting Apache Log4j has been discovered as the security industry has scrambled to mitigate and fix a severe zero-day Java library logging flaw (CVE-2021-44228) dubbed Log4Shell. The new vulnerability, CVE 2021-45046, could allow attackers to craft malicious […]


Cybersecurity

Ransomware: Cyber criminals are still exploiting these old vulnerabilities, so patch now

October 8, 2021

Via: ZDnet

Some of the cybersecurity vulnerabilities most commonly exploited by cyber criminals to help distribute ransomware are years old – but attackers are still able to take advantage of them because security updates aren’t being applied. Cybersecurity researchers at Qualys examined […]


Cybersecurity

50% of Servers Have Weak Security Long After Patches Are Released

September 30, 2021

Via: Dark Reading

Many organizations lag in patching high-severity vulnerabilities, according to a new study that reveals more than 50% of servers scanned have a weak security posture weeks and months after a security update is released. To create the “2021 Trustwave SpiderLabs […]


Cloud Computing, Cybersecurity, Tech

NSA, CISA release Kubernetes hardening guidance following Colonial Pipeline, other attacks

August 5, 2021

Via: CSO Online

Earlier this week, the US National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) issued a joint document entitled Kubernetes Hardening Guidance. Kubernetes is an open-source orchestration system that relies on containers to automate the deployment, scaling […]


Cybersecurity

Feds list the top 30 most exploited vulnerabilities. Many are years old

July 29, 2021

Via: ArsTechnica

Government officials in the US, UK, and Australia are urging public- and private-sector organizations to secure their networks by ensuring firewalls, VPNs, and other network-perimeter devices are patched against the most widespread exploits. In a joint advisory published Wednesday, the […]


Cybersecurity

Microsoft Warns of 25 Critical Vulnerabilities in IoT, Industrial Devices

April 30, 2021

Via: Threat Post

Security researchers at Microsoft are warning the industry about 25 as-yet undocumented critical memory-allocation vulnerabilities across a number of vendors’ IoT and industrial devices that threat actors could exploit to execute malicious code across a network or cause an entire […]


Cybersecurity

The FBI is hacking hundreds of computers in the US, but for a good reason

April 14, 2021

Via: BGR

A little more than a month after Microsoft disclosed a bombshell piece of cybersecurity industry news — an attack on Microsoft Exchange servers, whereby state-sponsored hackers from China were chaining together attacks on four vulnerabilities in Microsoft’s email cloud service […]


Cybersecurity

Five Critical Android Bugs Patched, Part of Feb. Security Bulletin

February 3, 2021

Via: Threat Post

Google patched five critical bugs in its Android operating system as part of its February Security Bulletin. Two of the flaws were remote code execution vulnerabilities found within the Android media framework and system. Three additional critical Qualcomm bugs were […]


Cybersecurity

North Korea Targets Security Researchers in Elaborate 0-Day Campaign

January 26, 2021

Via: Threat Post

Hackers linked to North Korea are targeting security researchers with an elaborate social-engineering campaign that sets up trusted relationships with them — and then infects their organizations’ systems with custom backdoor malware. That’s according to Google’s Threat Analysis Group (TAG), […]