Verizon discovers spike in ransomware and exploited vulnerabilities

Verizon’s 2025 Data Breach Investigations Report noted a 37% increase in ransomware attacks and a 34% increase in exploited vulnerabilities.

The post Verizon discovers spike in ransomware and exploited vulnerabilities appeared first on CyberScoop.

Continue reading Verizon discovers spike in ransomware and exploited vulnerabilities

Verizon discovers spike in ransomware and exploited vulnerabilities

Verizon’s 2025 Data Breach Investigations Report noted a 37% increase in ransomware attacks and a 34% increase in exploited vulnerabilities.

The post Verizon discovers spike in ransomware and exploited vulnerabilities appeared first on CyberScoop.

Continue reading Verizon discovers spike in ransomware and exploited vulnerabilities

Attackers stick with effective intrusion points, valid credentials and exploits

Infostealers fueled the staying power of identity-based attacks, increasing 84% on a weekly average last year, according to IBM X-Force.

The post Attackers stick with effective intrusion points, valid credentials and exploits appeared first on CyberScoop.

Continue reading Attackers stick with effective intrusion points, valid credentials and exploits

Is Ivanti the problem or a symptom of a systemic issue with network devices?

Network edge devices — hardware that powers firewalls, VPNs and network routers — have quickly moved up the list of attackers’ preferred intrusion points into enterprise networks. While dozens of companies make and sell these devices, customers of one company in particular — Ivanti — have confronted exploited vulnerabilities in their products more than any […]

The post Is Ivanti the problem or a symptom of a systemic issue with network devices? appeared first on CyberScoop.

Continue reading Is Ivanti the problem or a symptom of a systemic issue with network devices?

Microsoft patches zero-day actively exploited in string of ransomware attacks

Microsoft said Storm-2460 has exploited the zero-day in the Windows Common Log File System to attack organizations in the U.S., Venezuela, Spain and Saudi Arabia.

The post Microsoft patches zero-day actively exploited in string of ransomware attacks appeared first on CyberScoop.

Continue reading Microsoft patches zero-day actively exploited in string of ransomware attacks

Google addresses 2 actively exploited vulnerabilities in security update

Serbian security services exploited one of the actively exploited vulnerabilities to break into the phone of a youth activist in Serbia, according to Amnesty International.

The post Google addresses 2 actively exploited vulnerabilities in security update appeared first on CyberScoop.

Continue reading Google addresses 2 actively exploited vulnerabilities in security update

China-backed espionage group hits Ivanti customers again

UNC5221 has a knack for exploiting defects in Ivanti products. The group has exploited at least four vulnerabilities in the vendor’s products since 2023, according to Mandiant.

The post China-backed espionage group hits Ivanti customers again appeared first on CyberScoop.

Continue reading China-backed espionage group hits Ivanti customers again

Independent tests show why orgs should use third-party cloud security services

AWS, Microsoft Azure and Google Cloud Platform each scored 0% security effectiveness in CyberRatings.org’s evaluation of cloud network firewall vendors’ ability to prevent exploits and evasions.

The post Independent tests show why orgs should use third-party cloud security services appeared first on CyberScoop.

Continue reading Independent tests show why orgs should use third-party cloud security services

Apple issues fixes for vulnerabilities in both old and new OS versions

The company released a host of security patches Monday, including ones that address two zero-day vulnerabilities.

The post Apple issues fixes for vulnerabilities in both old and new OS versions appeared first on CyberScoop.

Continue reading Apple issues fixes for vulnerabilities in both old and new OS versions

Identity lapses ensnared organizations at scale in 2024

Cisco Talos observed identity-based attacks in 60% of the incidents it responded to last year.

The post Identity lapses ensnared organizations at scale in 2024 appeared first on CyberScoop.

Continue reading Identity lapses ensnared organizations at scale in 2024