Security vulnerabilities stories - Page 10
BackBox introduces major update to Network Vulnerability Manager
Fri, 29th Mar 2024
#
ransomware
#
breach prevention
#
backbox
BackBox enhances network vulnerability management with an update to its Network Vulnerability Manager, allowing organisations to mark mitigated Common Vulnerabilities and Exposures, thus refining their risk scores and optimising remediation efforts.
LG Magna e-Powertrain earns TV Rheinland's CSMS certification
Fri, 29th Mar 2024
#
advanced persistent threat protection
#
cybersecurity
#
certification
LG Magna e-Powertrain achieves global certification for its Cyber Security Management System, cementing compliance with impending UNECE WP.29 car cybersecurity regulations.
LG Magna earns cybersecurity certification ahead of new regulations
Wed, 27th Mar 2024
#
cybersecurity
#
certification
#
security vulnerabilities
LG Magna secures Cyber Security Management System certification ahead of new global regulations due July 2024.
New study exposes flaw-riddled corporate web applications
Tue, 19th Mar 2024
#
uc
#
crypto
#
blockchain
Kaspersky study unveils that between 2021-2023, access control and data protection flaws were found in numerous corporate web applications.
A proactive approach to cyber and physical security
Wed, 13th Mar 2024
#
network infrastructure
#
encryption
#
mfa
Recent Genetec survey reveals a rising awareness of cyber threats targeting physical security systems, sparking increased investment in cybersecurity resources and protocols.
IWD 2024: Embrace Your Vulnerability to Drive Growth
Fri, 8th Mar 2024
#
amazon
#
education, learning & training
#
leadership
On International Women's Day 2024, women are urged to harness moments of vulnerability and change to drive personal and professional growth, challenging fears and embracing innovation.
IWD 2024: Pushing through the uncomfortable to empower your teams
Thu, 7th Mar 2024
#
education, learning & training
#
workplace
#
support
On International Women's Day 2024, women strive for equality in STEM fields, overcoming difficulties, and advocating for their teams, with data indicating a growing desire for career progression.
VIAVI adds traffic analysis capabilities to Observer Sentry SaaS solution
Wed, 6th Mar 2024
#
saas
#
devops
#
hyperscale
VIAVI Solutions boosts Insight into threats for enterprises using multiple AWS clouds with the addition of traffic analysis capabilities to its Observer Sentry SaaS solution.
Checkmarx report reveals 92% companies faced breach due to app vulnerabilities
Mon, 4th Mar 2024
#
application security
#
software development
#
apps
Future of AppSec research by Checkmarx unveils 92% of firms suffered a breach in the past year due to flaws in in-house developed applications.
HackerOne launches AI co-pilot Hai to improve vulnerability response times
Thu, 29th Feb 2024
#
data protection
#
ai
#
hackers
HackerOne unveils AI co-pilot, Hai, reducing businesses' time interpreting vulnerability reports and boosting rectification efficiency by translating technical data into user-friendly information.
APIs become the leading attack vector, cybersecurity research shows
Wed, 28th Feb 2024
#
edutech
#
breach prevention
#
api
Cybersecurity firm Imperva has found that 71% of last year's web traffic was linked to APIs, acting as a major attack vector due to organisations' insufficient visibility, leading to a sharp rise in targeted attacks.
Trend Micro dismantles major ransomware group LockBit
Wed, 28th Feb 2024
#
malware
#
advanced persistent threat protection
#
cybersecurity
Trend Micro collaborates with global law enforcement agents to disrupt major ransomware group, LockBit, responsible for a quarter of 2023's ransomware leaks amounting to billions of dollars.
Jamf report highlights poor cyber hygiene in organisations & individuals
Mon, 26th Feb 2024
#
malware
#
mdm
#
phishing
40% of mobile users and 39% of organisations are vulnerable to cyber threats as they operate devices with known weaknesses, according to Jamf's annual Security 360 report.
Hackuity achieves SOC 2 Type II compliance for data security
Wed, 21st Feb 2024
#
risk & compliance
#
security vulnerabilities
#
data security
Hackuity, the RBVM company, attains SOC 2 Type II compliance, showcasing strong data security and compliance that uphold rigorous American standards, providing customers with enterprise-grade security assurance.
New Barracuda threat report reveals web apps exploitation methods
Tue, 20th Feb 2024
#
firewalls
#
ddos
#
data protection
The Threat Spotlight report by Barracuda Networks reveals a surge in cyberattacks exploiting web application security gaps, with over 18 billion attacks mitigated in 2023.
Armis acquires CTCI, forms AI-powered cybersecurity powerhouse
Thu, 15th Feb 2024
#
ai
#
cybersecurity
#
threat intelligence
Armis acquires AI threat intelligence firm, CTCI, boosting its forecast abilities and creating a powerful new Global Threat Intelligence Service.
Australian & NZ workers fear businesses are ill-equipped for cyber threats
Tue, 13th Feb 2024
#
phishing
#
email security
#
casb
Nearly half of Australian and New Zealand workers do not feel ready to combat cyberattack threats, with 43% fearing becoming scam or phishing victims at work, ELMO Software research reveals.
Absolute Software offers 90-day free support amid Ivanti vulnerabilities
Mon, 5th Feb 2024
#
cybersecurity
#
security vulnerabilities
#
ivanti
Absolute Software steps up amid Ivanti vulnerabilities, offering 90 days of free product licenses and support to potentially affected organisations for cyber resilience.
Sternum & ChargePoint secure Home Flex against IoT vulnerabilities
Fri, 26th Jan 2024
#
data analytics
#
martech
#
iot
In a bid to combat IoT vulnerabilities, security firm Sternum collaborates with ChargePoint to enhance the protection of ChargePoint Home Flex, following the uncovering of significant security flaws.
SecurityBridge rated a top source for SAP vulnerability discoveries
Wed, 24th Jan 2024
#
edutech
#
software
#
sap
SecurityBridge's Research Lab is lauded by SAP's Security Response Team as a leading source for detecting software issues. This recognises a key role in fortifying international SAP security infrastructure.