FutureFive New Zealand - Consumer technology news & reviews from the future

Common Vulnerabilities and Exposures (CVE) stories - Page 18

Fallback

Puppet launches vulnerability remediation product

Thu, 22nd Aug 2019
#
it automation
#
cybersecurity
#
security vulnerabilities
With vulnerabilities and security breaches on the rise, the latest Puppet product helps IT teams find, prioritise and remediate vulnerabilities.
Gettyimages 669614252

Popular enterprise printers riddled with security risks

Thu, 15th Aug 2019
#
hp
#
printing
#
brother
Researchers from NCC Group analysed different aspects of six mid-range enterprise printers manufactured by HP, Ricoh, Xerox, Lexmark, Kyocera, and Brother.
Malware1

Check Point: Attackers executing commands remotely with latest malware

Wed, 14th Aug 2019
#
malware
#
iot security
#
cybersecurity
Threat actors are quick to try and exploit new vulnerabilities when they emerge, before organisations have had the chance to patch them.
Cybersecurity40

Cohesity launches new vulnerability scan using backup data

Tue, 6th Aug 2019
#
cybersecurity
#
security vulnerabilities
#
cyber attacks
The application works by scanning backup copies on to identify any vulnerabilities across an organisation's IT environment.
Gettyimages 496835011

Vulnerabilities in cloud containers soar, report finds

Wed, 31st Jul 2019
#
cloud services
#
security vulnerabilities
#
containers
Cloud container vulnerabilities are on the rise, increasing by 46% compared to last year, according to Skybox Security's latest report.
Gettyimages 1128829042

Sophos highlights dangers of remote desktop protocol attacks

Wed, 24th Jul 2019
#
firewalls
#
network infrastructure
#
network security
Sophos research reveals that remote desktop protocol (RDP) is the preferred method of attack for cybercriminals targeting vulnerable devices.
Gettyimages 1048265360

ZombieLoad: Another batch of flaws affect Intel chips

Thu, 16th May 2019
#
semiconductors
#
hyperscale
#
public cloud
Intel-powered computers are facing a new vulnerability called 'ZombieLoad' WHERE id = which allows attackers to leak information from protected memory.
Gettyimages 1139635207

PrinterLogic software vulnerable to remote attacks

Thu, 9th May 2019
#
printing
#
security vulnerabilities
#
printerlogic
Businesses using PrinterLogic Print Management Software are urged to deploy 'always on' VPNs amid new vulnerabilities that risk remote attacks on workstations.
Gettyimages 951013614

Security alert: More than 2 million IoT devices are now junk

Wed, 1st May 2019
#
smart home
#
f-secure
#
security vulnerabilities
Over two million IoT devices, including security cameras and baby monitors, have critical security flaws, warns researcher Paul Marrapese.
Gettyimages 1091348950

Questions every security and risk management leader should ask

Tue, 30th Apr 2019
#
cloud security
#
risk & compliance
#
cybersecurity
Every organisation across major industries must prioritize cybersecurity and take necessary precautions, says Forescout.
Gettyimages 1126752471

Belkin WeMo Insight smart plugs vulnerable to attack

Mon, 29th Apr 2019
#
iot
#
smart home
#
casb
Belkin's WeMo Insight smart plugs are at risk as McAfee reveals a nearly year-old vulnerability still unpatched, potentially allowing serious cyberattacks.
Dashboard2

Flashpoint announces new features on intelligence platform

Fri, 26th Apr 2019
#
cybersecurity
#
healthtech
#
flashpoint
The platform now features new dashboards and analytics, expanded datasets, chat services and communities, and industry alerting.
Vulnerability

Sonatype and HackerOne partner on open source vulnerability reporting

Mon, 25th Mar 2019
#
partner programmes
#
supply chain
#
open source
Without a standard for responsible disclosure, even those who want to disclose vulnerabilities responsibly can get frustrated with the process.
Malware6

Check Point names February's most disruptive malware

Tue, 12th Mar 2019
#
security vulnerabilities
#
coinhive
#
cryptomining
Coinhive tops Check Point's Global Threat Index for February 2019, marking its 15th month as the most disruptive malware despite its impending shutdown.
Gettyimages 891422960

IBM X-Force Red & Qualys introduce automated patching

Tue, 19th Feb 2019
#
ibm
#
security vulnerabilities
#
patching
IBM X-Force Red and Qualys are declaring a war on unpatched systems, and they believe automation is the answer.
Malware3

New threat rears its head in new malware report

Thu, 14th Feb 2019
#
malware
#
cybersecurity
#
cryptomalware
Check Point's researchers view Speakup as a significant threat, as it can be used to download and spread any malware.
Manufacturing   ot2

OT attacks and cryptominers on the rise – Skybox

Wed, 30th Jan 2019
#
cloud security
#
iot security
#
report
Skybox Security's 2019 Vulnerability and Threat Trends Report analyzes what shaped the threat landscape over 2018 and what it means for the year ahead.
Cryptojacking3

Malware downloader on the rise in Check Point's latest Threat Index

Wed, 16th Jan 2019
#
malware
#
cybersecurity
#
report
Organisations continue to be targeted by cryptominers, despite an overall drop in value across all cryptocurrencies in 2018.
Thinkstockphotos 850146276

Meet Rentbot, the chatbot that can help with tenancy law

Mon, 10th Dec 2018
#
uc
#
martech
#
agentic ai
If you find yourself in a tricky situation  - or if you just want to understand your rights as a landlord or tenant, you can now turn to a chatbot for help.
Malware

2018's worst malware revealed in report

Fri, 2nd Nov 2018
#
malware
#
ransomware
#
ai security
Webroot's 2018 Nastiest Malware report highlights Emotet, Trickbot, and GhostMiner as the latest threats, urging improved cybersecurity measures.