Remove 2017 Remove Blog Remove Malware Remove Network
article thumbnail

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021

Tenable

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021. International cybersecurity agencies issue a joint alert outlining the top malware strains of 2021. While malware is used for a variety of purposes, the government agencies point out that ransomware is a primary use case. CVE-2017-0144.

Malware 74
article thumbnail

Daisy Chaining: How Vulnerabilities Can Be Greater Than the Sum of Their Parts

Tenable

Over the last few months, Tenable has published multiple blog posts analyzing recent FBI and CISA (Cybersecurity & Infrastructure Security Agency) alerts regarding nation-state groups 3 and APT actors 4 chaining together vulnerabilities against a number of government agencies and U.S.-based based networks. and abroad. .

Malware 102
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cybersecurity Snapshot: Critical Infrastructure Orgs Cautioned About Chinese Drones, While Water Plants Advised To Boost Incident Response

Tenable

In addition, the latest on the Androxgh0st malware. As a result, using unmanned aircraft systems UAS), more commonly known as drones, “requires careful consideration and potential mitigation to reduce risk to networks and sensitive information,” reads the joint advisory “ Cybersecurity Guidance: Chinese-Manufactured UAS.” The upside?

article thumbnail

Cybersecurity Snapshot: 6 Things That Matter Right Now

Tenable

This 16-page guide offers SMBs “an action plan for ransomware mitigation, response and recovery” and recommends 40 safeguards, including: Identify what’s on your network, both in terms of technology being used and of data being stored or transmitted. Vulnerabilities associated with 2021’s top malware. CVE-2017-0144. and the U.K.

IoT 52
article thumbnail

COVID-19: Coronavirus Fears Seized by Cybercriminals

Tenable

Malware and phishing campaigns use global interest in the novel coronavirus to capitalize on fear and uncertainty around the pandemic. Coronavirus-themed malware campaigns. IBM’s X-Force team compiled some indicators of compromise on January 29 and published a summary blog post on February 5. Image source: Proofpoint blog.

Malware 112
article thumbnail

South Korean and American Agencies Release Joint Advisory on North Korean Ransomware

Tenable

The threat actors use virtual private networks/servers and IP addresses in countries outside of North Korea to further obfuscate their identities. The actors have also used trojan versions of X-Popup, a messenger application used in several smaller hospitals in South Korea and have spread malware using 2 malicious domains, xpopup.pe[.]kr

Malware 53
article thumbnail

AA23-215A: 2022's Top Routinely Exploited Vulnerabilities

Tenable

Analysis As we examined the list of 42 CVEs in the CSA, many have been featured in past blogs and alerts from Tenable Research as well as included in our 2020 , 2021 and 2022 TLR. This blog post was published on August 3 and reflects VPR at that time. CVE Description CVSSv3 VPR CVE-2017-0199 Microsoft Office/WordPad RCE 7.8