FutureFive New Zealand - Consumer technology news & reviews from the future

Common Vulnerabilities and Exposures (CVE) stories - Page 12

Gettyimages 1169668297

What's the story around cyber attackers and IoT devices?

Wed, 9th Nov 2022
#
iot
#
zero trust security
#
opinion
IDC forecasts that the ANZ spending on the Internet of Things (IoT) will reach $24 billion in 2026, a compounded annual growth rate of 10% for 2021-26.
Gettyimages 1055083194

Time to rethink how to fix software supply chain vulnerabilities

Mon, 7th Nov 2022
#
ransomware
#
it automation
#
supply chain
IT teams are still grappling with the Log4Shell vulnerability, affecting Java enterprise applications and making holiday surprises likely.
Gettyimages 1327932749

Azul launches a new Saas to secure software supply chain

Fri, 4th Nov 2022
#
saas
#
martech
#
supply chain
Azul's Vulnerability Detection, the new SaaS product, continuously detects vulnerabilities in Java applications by eliminating false positives.
Gettyimages 473158924

Claroty reveals new cryptographic key extraction method

Fri, 14th Oct 2022
#
healthtech
#
security vulnerabilities
#
information protection
Claroty's Team82 exposes major security vulnerabilities in Siemens PLCs and Dataprobe's PDUs, prompting urgent updates.
Gettyimages 507473994

A deep dive into a Corporate Espionage operation

Tue, 4th Oct 2022
#
hyperscale
#
public cloud
#
phishing
Rise in hybrid cyberattacks targeting small companies sparks concern over vulnerability exploits, as corporate espionage becomes widespread.
Gettyimages 1162361864

Continuous attack attempts discovered on Atlassian Confluence zero day

Mon, 3rd Oct 2022
#
firewalls
#
ddos
#
breach prevention
Following a coordinated disclosure of a zero-day vulnerability by Volexity in Atlassian Confluence, attackers went wild to exploit it.
Gettyimages 1354202603

Black Lotus Labs discovers new, multipurpose malware

Fri, 30th Sep 2022
#
malware
#
ddos
#
cybersecurity
Black Lotus Labs, the threat intelligence team at Lumen, has discovered a new, rapidly growing, multipurpose malware written in the Go programming language.
Gettyimages 1369133274

Decrease in malware volume, but surge in encrypted malware

Thu, 29th Sep 2022
#
malware
#
firewalls
#
network infrastructure
The Q2 Internet Security Report found office exploits continue to spread more than any other category of malware.
Gettyimages 1025744810

Trellix advances threat intelligence with new research centre

Tue, 27th Sep 2022
#
edutech
#
advanced persistent threat protection
#
supply chain
Trellix has announced the establishment of the Trellix Advanced Research Center to advance global threat intelligence.
Gettyimages 1144604134

August's top malware: Emotet knocked off top spot

Fri, 16th Sep 2022
#
malware
#
cybersecurity
#
healthtech
FormBook is now the most prevalent malware, taking over from Emotet, which has held that position since its reappearance in January.
Gettyimages 1327563382

Rapid7 issues vulnerability advisory for two Baxter devices

Tue, 13th Sep 2022
#
iot
#
advanced persistent threat protection
#
cybersecurity
Rapid7 has issued a vulnerability advisory for two Baxter Healthcare TCP/IP-enabled medical devices: SIGMA Spectrum Infusion Pump and SIGMA WiFi Battery.
Pic   carolina valencia (2)

How to protect against the growing fileless malware threat

Wed, 31st Aug 2022
#
malware
#
ddos
#
data protection
In 2017 the Ponemon Institute reported that fileless attacks are ten times more successful than file-based attacks.
Gettyimages 1319188207

Internet of Things vulnerability disclosures grew 57%

Fri, 26th Aug 2022
#
iot
#
cybersecurity
#
security vulnerabilities
Vulnerability disclosures impacting IoT devices increased by 57% in the first half of 2022 compared to the previous six months.
Gettyimages 1191833199

Ransomware variants almost double in six months – FortiGuard

Mon, 22nd Aug 2022
#
malware
#
ransomware
#
ndr
Exploit trends demonstrate the endpoint remains a target as work-from-anywhere continues, according to a new report.
Compatible scott hesford beyondtrust

'Windows shops' target admin rights to de-risk their environments

Wed, 17th Aug 2022
#
cybersecurity
#
windows
#
opinion
New data shows up to 75% of critical vulnerabilities could be mitigated through a rights and privileges crackdown.
Gettyimages 1367402313  1

8x more users attacked via old Microsoft Office vulnerability in Q2

Wed, 17th Aug 2022
#
cybersecurity
#
microsoft
#
kaspersky
Exploits for vulnerabilities in Microsoft Office have surged, accounting for 82% of total exploits in Q2 2022, according to Kaspersky.
Gettyimages 1206802008

Tenable makes additions to Cloud Security portfolio

Fri, 12th Aug 2022
#
devops
#
cloud security
#
multi-cloud
Tenable has announced additions to Tenable Cloud Security that represent the next step in assessing threats related to cloud vulnerabilities.
Gettyimages 1283720086

Nozomi Networks Labs identifies impacts on 2022 threat landscape

Thu, 4th Aug 2022
#
malware
#
edutech
#
iot security
Nozomi Networks' latest research reveals wiper malware, IoT botnet activity, and the Russia/Ukraine war as key threats in 2022.
Gettyimages 1372349649

Claroty's Team82 uncovers two vulnerabilities in FileWave's MDM system

Fri, 29th Jul 2022
#
uc
#
mdm
#
breach prevention
Claroty's research arm (Team82) has uncovered and disclosed two critical vulnerabilities in FileWave's Mobile Device Management (MDM) system.
Gettyimages 1360520538

Aqua Security unveils out-of-the-box runtime protection

Tue, 26th Jul 2022
#
data protection
#
cloud security
#
application security
Aqua Security has launched out-of-the-box runtime protection with minimal configuration to stop attacks in real-time on running workloads.