FutureFive New Zealand - Consumer technology news & reviews from the future

Common Vulnerabilities and Exposures (CVE) stories - Page 8

Cybersecurity trends

2024 cybersecurity trends: AI, cloud and threat intelligence

Tue, 23rd Jan 2024
#
cloud security
#
application security
#
supply chain
We see 2024 shaping up to be the defining moment where AI may become the profound battleground in cybersecurity.
Img bwuqvdhmxt9lyttvb8q84ynu

Cyber attacks double, utilities & manufacturing hardest hit

Tue, 23rd Jan 2024
#
advanced persistent threat protection
#
cybersecurity
#
cto
Armis's report shows cyber attacks globally doubled in 2023, with utilities and manufacturing sectors the hardest hit.
Img arv0qgr97geqjq8qhrl2cdo2

Less than 1% vulnerabilities pose highest risk in 2023, finds Qualys

Thu, 18th Jan 2024
#
malware
#
ransomware
#
advanced persistent threat protection
Less than 1% of security vulnerabilities created the highest risks to businesses in 2023, with 97 high-risk vulnerabilities exploited undetected, says Qualys Threat Research Unit report.
Img gk1dq3e1nthqfldg2ayqwfez

Ivanti VPN vulnerabilities exploited by suspected espionage group UNC5221

Mon, 15th Jan 2024
#
malware
#
vpns
#
advanced persistent threat protection
Suspected espionage group UNC5221 exploited two zero-day vulnerabilities in Ivanti VPN and security appliances, using multiple custom malware families for post-exploitation espionage.
Img bbtjoeroeexskotw4vlzxjwv

Software security strains under supply chain complexity, Slim.AI reveals

Fri, 5th Jan 2024
#
supply chain
#
ai
#
cybersecurity
Over 40% of firms struggle to tackle vulnerabilities in the rising complexity of software supply chains, despite sizeable resource allocation, says Slim.AI's recent Container Report.
Img unz2oto4dkfidv8qdma1gjiu

Operation Triangulation: Undocumented iPhone hardware feature exposed

Thu, 28th Dec 2023
#
devops
#
apm
#
software development
Kaspersky's GReAT team has uncovered an undisclosed iPhone hardware feature used in Operation Triangulation attacks.
Erin stephan

Beware the lasting legacy of the Log4j vulnerability

Mon, 18th Dec 2023
#
application security
#
open source
#
software development
Efforts to mitigate the Log4j vulnerability involve updating to patched versions of Log4j, but the process continues to be complex.
Img ddui8yiwhalehzm6l72btco2

Claroty Team82 discovers cybersecurity threats to industrial automation systems

Thu, 14th Dec 2023
#
data analytics
#
rpa
#
cybersecurity
Team82 at Claroty uncovers substantial cybersecurity vulnerabilities in Operational Technology protocol clients, showing potential for full system control.
Kristen nolan headshot 1

Aqua Security on how to navigate the Cloud's complexities

Fri, 8th Dec 2023
#
devops
#
fintech
#
application security
With all the benefits the cloud has to offer, it also introduces a new set of challenges, particularly for industries where security and compliance are priorities.
Img owvyeavvumb28gu0ogqyuqpv

OpenSSF announces new members & secure software development principles

Tue, 5th Dec 2023
#
advanced persistent threat protection
#
open source
#
ai
OpenSSF introduces new members including Patchstack and SparkFabrik, and outlines secure software development principles.
Img gboizwjo8aly3bavwovnptju

Rising cybersecurity threats prompt shift from traditional password methods

Mon, 27th Nov 2023
#
mfa
#
advanced persistent threat protection
#
email security
Rising cybersecurity threats prompt a shift from traditional, vulnerable password methods to phishing-resistant authentication solutions.
Rat

Check Point reveals rise of NJRat & AgentTesla in cyber threat landscape

Thu, 9th Nov 2023
#
endpoint protection
#
edr
#
online shopping
Check Point's latest Global Threat Index exposes a surge in Remote Access Trojan NJRat and an AgentTesla campaign.
Workflow

Action1 set to boost enterprise IT security with automated remediation workflows

Mon, 6th Nov 2023
#
cx
#
martech
#
data privacy
Action1 Corp. is releasing an enterprise IT security solution integrating automated vulnerability remediation workflows.
Cybersecurity 3

CAST unveils autumn release of software intelligence product

Fri, 27th Oct 2023
#
public cloud
#
microsoft
#
cloud services
CAST has launched their autumn release of software intelligence product, CAST Highlight, designed to enhance cloud migration and optimisation.
Java

First Azul State of Java survey reveals Java's crucial role in tech industry

Wed, 25th Oct 2023
#
private cloud
#
hybrid cloud
#
public cloud
Azul's inaugural State of Java survey highlights Java's vital role in global tech, with 98% of firms reporting usage.
Monitor vulnerabilities

BackBox introduces Network Vulnerability Manager for organised risk assessment

Mon, 23rd Oct 2023
#
advanced persistent threat protection
#
risk & compliance
#
cloud services
BackBox launches Network Vulnerability Manager, a tool for automated risk assessment and efficient remediation.
Gettyimages 1432744815

Hackuity launches Version 2.0 of next gen vulnerability management

Fri, 13th Oct 2023
#
martech
#
risk & compliance
#
software development
Hackuity, the risk-based vulnerability management provider, has launched Version 2.0 of its platform with major enhancements to support risk prioritisation.
Gettyimages 1173319475

Security Journey unveils role-specific learning paths for software security

Thu, 12th Oct 2023
#
application security
#
devsecops
#
software development
Security Journey unveils tailored secure coding courses aimed at enhancing software security and regulatory compliance.
Gettyimages 958626050

Keeper Security with first in joining the CVE programme

Fri, 6th Oct 2023
#
devops
#
pam
#
apm
Keeper Security, a leader in password management, has become the first company in its field to join the CVE programme as a CNA.
Gettyimages 1418355666

Severe 'Looney Tunables' security flaw found in some Linux editions

Wed, 4th Oct 2023
#
cybersecurity
#
linux
#
security vulnerabilities
Major security flaw, 'Looney Tunables', detected in glibc, threatens Linux distributions, urgent patch recommended.