article thumbnail

From Bugs to Breaches: 25 Significant CVEs As MITRE CVE Turns 25

Tenable

Attackers could exploit Shellshock to gain full control of vulnerable systems, leading to data breaches, service interruptions and malware deployment. Once CVE-2017-11882 became public, cybercriminals and APT groups included it in maliciously crafted Office files. The impact extended far beyond local systems.

article thumbnail

Dragos raises $110M Series C as demand to secure industrial systems soars

TechCrunch

Saudi oil and gas manufacturing plants have been the target of several cyberattacks, including the Trisis malware in 2017 that shut down one of the kingdom’s biggest petrochemical plants. But the country has faced extensive criticism for its human rights record by international rights groups.

Industry 305
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021

Tenable

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021. International cybersecurity agencies issue a joint alert outlining the top malware strains of 2021. While malware is used for a variety of purposes, the government agencies point out that ransomware is a primary use case. CVE-2017-0144.

Malware 82
article thumbnail

SafeBreach discloses vulnerabilities in Avast, AVG, Avira

The Parallax

The SafeBreach disclosures accompany a report from Avast revealing a new attack against its CCleaner software on Monday, October 21, following a 2017 hack. The malware released last month or last year is not as dangerous as the one released in the past few minutes,” de Carné de Carnavalet says.

article thumbnail

Even North Korea has an antivirus program—but it’s used for spying

The Parallax

Malware and antivirus software usually go together like tacos and pickles. Pretty much any software can be targeted to be ripped off,” says Mark Lechtik, a security researcher on the Check Point Malware Research Team who led the investigation into SiliVaccine. Leave it to North Korea to combine them like peanut butter and jelly.

Spyware 187
article thumbnail

Your old router could be a hacking group’s APT pawn

The Parallax

T o create layers of obfuscation that hide an attack’s origins, Grange says, Inception Framework then reroutes its malicious messages at least three times through the hijacked routers before ultimately sending them to their targets, or allowing the hidden malware to communicate with its control server.

Malware 223
article thumbnail

CVE-2025-31324: Zero-Day Vulnerability in SAP NetWeaver Exploited in the Wild

Tenable

Initially it was unclear if their discovery was a new vulnerability or the abuse of CVE-2017-9844 , a vulnerability that could lead to a denial-of-service (DoS) condition or arbitrary code execution. These webshells were used to deploy malware and establish communications with command and control (C2) servers.

Malware 66