Advertisement

virtual private network (VPN)

A logo sign outside of the headquarters of Ivanti in South Jordan, Utah. (Kristoffer Tripplaar / Alamy Stock Photo)

Questions mount as Ivanti tackles another round of zero-days

The besieged security vendor maintains the latest exploited vulnerabilities in its products are entirely linked to unspecified security issues in open-source libraries. Some researchers aren’t buying it.
The four most frequently exploited vulnerabilities were all contained in edge devices, such as VPNs, firewalls and routers. (Getty Images)

Attackers hit security device defects hard in 2024

Mandiant said exploits were the most common initial access vector last year, linking software defects to 1 in 3 attacks. The most commonly exploited vulnerabilities affected network…
Advertisement
A replica of the Soviet Banner of Victory flies by a WWII memorial in the city of Kherson on May 20, 2022, amid the ongoing Russian military occupation of the region. (Photo by ANDREY BORODULIN/AFP via Getty Images)

Mixed results for Russia’s aggressive Ukraine information war, experts say

Russia want to control the internet in occupied Ukraine to feed the population disinformation — and to prevent Ukrainians from sharing video of Russian troops with Ukrainian…
Advertisement
Advertisement
Advertisement