Cisco encourages users to update to an unaffected version of its Adaptive Security Appliance (ASA) software since there are no workarounds for the 2014 vulnerability.
Follow Dark Reading:
 December 04, 2024
LATEST SECURITY NEWS & COMMENTARY
Decade-Old Cisco Vulnerability Under Active Exploit
Cisco encourages users to update to an unaffected version of its Adaptive Security Appliance (ASA) software since there are no workarounds for the 2014 vulnerability.
Misconfigured WAFs Heighten DoS, Breach Risks
Organizations that rely on their content delivery network provider for Web application firewall services may be inadvertently leaving themselves open to attack.
Cyber-Unsafe Employees Increasingly Put Orgs at Risk
Too much access and privilege, plus a host of unsafe cyber practices, plague most workplaces, and the introduction of tools like GenAI will only make things worse.
Venom Spider Spins Web of New Malware for MaaS Platform
A novel backdoor malware and a loader that customizes payload names for each victim have been added to the threat group's cybercriminal tool set.
Ransomware's Grip on Healthcare
Until C-level executives fully understand potential threats and implement effective mitigation strategies, healthcare organizations will remain vulnerable and at risk of disruption.
(Sponsored Article) Thinking Outside the Box Is More Than a Slogan
Threat intelligence is more than analyzing bits and bytes. The consequences of failure mean we must think differently about how we analyze problems.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Note From the Editor-in-Chief
A change in ownership and what it means for our readers.

'White FAANG' Data Export Attack: A Gold Mine for PII Threats
Websites these days know everything about you — even some details you might not realize. Hackers can take advantage of that with a sharp-toothed attack that exploits Europe's GDPR-mandated data portability rules.

Incident Response Playbooks: Are You Prepared?
The playbooks that accompany your incident response plan provide efficiency and consistency in responses, help reduce downtime and dwell time, and can be a cost-saving and reputational-saving measure for your organization.

Ransomware Gangs Seek Pen Testers to Boost Quality
Qualified applicants must be able to test ransomware encryption and find bugs that might enable defenders to jailbreak the malware.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
'Bootkitty' First Bootloader to Take Aim at Linux
Though it's still just a proof of concept, the malware is functional and can evade the Secure Boot process on devices from multiple vendors.
LATEST FROM THE EDGE

Name That Edge Toon: Shackled!
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 gift card.
LATEST FROM DR TECHNOLOGY

SecureG, CTIA Project Secures Business Phone Calls
BCID mitigates the risk of consumers being harmed by fraud and bad actors by vetting to deliver a trusted, branded call experience for consumers.
LATEST FROM DR GLOBAL

African Reliance on Foreign Suppliers Boosts Insecurity Concerns
Recent backdoor implants and cyber-espionage attacks on their supply chains have African organizations looking to diversify beyond Chinese, American tech vendors.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.