FutureFive New Zealand - Consumer technology news & reviews from the future

Security vulnerabilities stories - Page 18

Gettyimages 1308810569

Four ways to secure cloud workloads and your crown jewels

Tue, 29th Mar 2022
#
iam
#
edr
#
cybersecurity
Cloud workloads are vulnerable to a variety of attacks. Understanding why and adopting runtime protection is crucial.
Image edited

The patch management challenge

Tue, 29th Mar 2022
#
supply chain
#
breach prevention
#
cybersecurity
We all know that patching is important, so why is the physical process for updating systems across the enterprise still so difficult?.
Gettyimages 904483442

New report shows increase of ICS vulnerabilities in critical infrastructure

Thu, 3rd Mar 2022
#
edutech
#
iot
#
breach prevention
The number of vulnerabilities in Industrial Control Systems (ICS) has surged by 110% in the past four years, according to a report by Claroty.
Gettyimages 1350308882

Five cyber threat trends and what they mean to your business

Fri, 25th Feb 2022
#
malware
#
ransomware
#
cloud security
Global cybercrime is on the rise, posing risks to businesses. Accenture has released a report on key cyber threat trends.
Gettyimages 1353222468

Video: 10 Minute IT Jams - SonicWall update on MSSP partnerships

Wed, 16th Feb 2022
#
firewalls
#
partner programmes
#
email security
Today marks out third SonicWall presentation in the series, and we speak to SonicWall vice president, global MSSP & carrier sales Luca Taglioretti.
Gettyimages 1286099765

Kaspersky uncovers multiple vulnerabilities in wearable tracking technology

Thu, 3rd Feb 2022
#
cybersecurity
#
healthtech
#
kaspersky
Kaspersky finds 33 vulnerabilities in protocol for transmitting data from wearable devices, including 18 critical ones in 2021 alone.
Gettyimages 1194783224

Qualys adds advanced remediation capabilities to Cloud Platform

Wed, 2nd Feb 2022
#
risk & compliance
#
cloud services
#
software
The new update enables organisations to fix asset misconfigurations, patch OS and third-party applications, and deploy custom software.
Gettyimages 1256603011  3

Nucleus Security teams up with Mandiant to enhance vulnerability management programs with threat intelligence

Wed, 2nd Feb 2022
#
advanced persistent threat protection
#
partner programmes
#
supply chain
Nucleus Security has entered into a strategic partnership with Mandiant, the leader in dynamic cyber defense and response.
Gettyimages 1010214836

Container adoption approaching maturity at expense of security best practices

Thu, 27th Jan 2022
#
devops
#
application security
#
devsecops
More than 75% of running containers have vulnerabilities, partly as a result of ignoring security and operational best practices.
Gettyimages 817486068

Supply chain vulnerability identified in SAP transport system

Fri, 21st Jan 2022
#
supply chain
#
software development
#
sap
Supply chain attacks on SAP software distribution process allow internal attackers to intervene undetected, says SecurityBridge. A patch has been released.
Gettyimages 1331135389

Vulnerabilities pose danger to SonicWall SMA 100 remote access appliances

Thu, 20th Jan 2022
#
iam
#
cybersecurity
#
sonicwall
SonicWall and Australia's ACSC are urging all businesses using SonicWall SMA 100 Series appliances to patch the devices as soon as possible.
Gettyimages 1287699228

Gartner explains what security leaders need to know, and do, about Log4j

Tue, 28th Dec 2021
#
malware
#
ransomware
#
cybersecurity
Log4j vulnerability prompts urgent action from security leaders. Gartner's Jonathan Care explains risks and steps to take.
Gettyimages 1144604245

A new tool to help the MSP community combat Log4j

Mon, 27th Dec 2021
#
partner programmes
#
cybersecurity
#
managed services
Datto is encouraging all MSPs to download a free script developed and made available on GitHub for any Remote Monitoring and Management solution.
Gettyimages 1359626730

1 in 10 servers and web apps vulnerable to Log4Shell

Mon, 27th Dec 2021
#
datacentre infrastructure
#
advanced persistent threat protection
#
cybersecurity
Only 70% of organizations have scanned for the Log4Shell vulnerability, leaving 10% of assessed assets vulnerable, warns cybersecurity firm Tenable.
Gettyimages 1153599381

What is Log4J and how does it affect you?

Fri, 24th Dec 2021
#
martech
#
cybersecurity
#
software development
Log4J software bug, aka Log4Shell, sparks concern as it affects various platforms. Norton Labs offers advice on protecting systems and applications.
Gettyimages 497953315  1

New threat intelligence from Sophos following the Apache Log4Shell vulnerability

Wed, 15th Dec 2021
#
malware
#
firewalls
#
network infrastructure
Sophos warns of a surge in cyberattacks exploiting the Apache Log4Shell vulnerability, with attempts exceeding hundreds of thousands so far.
Gettyimages 1134281175

Log4j actively exploited, serious complications can occur according to CERT NZ

Mon, 13th Dec 2021
#
martech
#
breach prevention
#
cybersecurity
The widely-used java logging library, log4j, has been actively exploited, according to an update from CERT NZ and Catalyst.
Gettyimages 817486068

Claroty and JFrog discover 14 vulnerabilities in Busybox

Fri, 19th Nov 2021
#
open source
#
linux
#
security vulnerabilities
Team82 and JFrog discover 14 vulnerabilities in the latest version of BusyBox, affecting OT and IoT devices running on Linux.
Gettyimages 1065824694  3

New Microsoft Defender vulnerability should concern every enterprise - expert

Mon, 15th Nov 2021
#
cybersecurity
#
microsoft
#
security vulnerabilities
Microsoft Defender vulnerability poses significant threat, warns Virsec. With 55 vulnerabilities in total, it is deemed the most concerning by experts.
Gettyimages 817486068

API vulnerabilities are a huge target for cyber criminals, report finds

Thu, 28th Oct 2021
#
edutech
#
ddos
#
api
API vulnerabilities pose a significant risk to companies and individuals worldwide, according to new research by Akamai Technologies.