Attackers hit security device defects hard in 2024

Mandiant said exploits were the most common initial access vector last year, linking software defects to 1 in 3 attacks. The most commonly exploited vulnerabilities affected network edge devices.

The post Attackers hit security device defects hard in 2024 appeared first on CyberScoop.

Continue reading Attackers hit security device defects hard in 2024

Is Ivanti the problem or a symptom of a systemic issue with network devices?

Network edge devices — hardware that powers firewalls, VPNs and network routers — have quickly moved up the list of attackers’ preferred intrusion points into enterprise networks. While dozens of companies make and sell these devices, customers of one company in particular — Ivanti — have confronted exploited vulnerabilities in their products more than any […]

The post Is Ivanti the problem or a symptom of a systemic issue with network devices? appeared first on CyberScoop.

Continue reading Is Ivanti the problem or a symptom of a systemic issue with network devices?

Independent tests show why orgs should use third-party cloud security services

AWS, Microsoft Azure and Google Cloud Platform each scored 0% security effectiveness in CyberRatings.org’s evaluation of cloud network firewall vendors’ ability to prevent exploits and evasions.

The post Independent tests show why orgs should use third-party cloud security services appeared first on CyberScoop.

Continue reading Independent tests show why orgs should use third-party cloud security services

Hackers Looking for Vulnerable Palo Alto Networks GlobalProtect Portals

GreyNoise warns of a coordinated effort probing the internet for potentially vulnerable Palo Alto Networks GlobalProtect instances.
The post Hackers Looking for Vulnerable Palo Alto Networks GlobalProtect Portals appeared first on SecurityWeek.
Continue reading Hackers Looking for Vulnerable Palo Alto Networks GlobalProtect Portals

Attackers are probing Palo Alto Networks GlobalProtect portals

Cybersecurity company GreyNoise is warning about a significant increase of scanning activity targeting internet-facing Palo Alto Networks GlobalProtect portals in the last 30 days, and has urged organizations with exposed systems to secure them and loo… Continue reading Attackers are probing Palo Alto Networks GlobalProtect portals

The North Korea worker problem is bigger than you think

The yearslong scheme goes much deeper than contract work, extending to roles beyond traditional IT and sometimes granting the insider threat “keys to the kingdom,” DTEX President Mohan Koo said.

The post The North Korea worker problem is bigger than you think appeared first on CyberScoop.

Continue reading The North Korea worker problem is bigger than you think

Infosec products of the month: March 2025

Here’s a look at the most interesting products from the past month, featuring releases from: 1Kosmos, Alloy, Cloudflare, Cytex, Detectify, GetReal Security, iProov, Keysight Technologies, Outpost24, Palo Alto Networks, Pondurance, Red Canary, SailPoint… Continue reading Infosec products of the month: March 2025

Who is sending those scammy text messages about unpaid tolls?

The latest smishing scam follows a familiar process as ones the industry has seen over the past decade.

The post Who is sending those scammy text messages about unpaid tolls? appeared first on CyberScoop.

Continue reading Who is sending those scammy text messages about unpaid tolls?

Multiple vulnerabilities found in ICONICS industrial SCADA software

The since-patched vulnerabilities allowed for privilege escalation, DLL hijacking, file modification and even total system compromise.

The post Multiple vulnerabilities found in ICONICS industrial SCADA software appeared first on CyberScoop.

Continue reading Multiple vulnerabilities found in ICONICS industrial SCADA software