FutureFive New Zealand - Consumer technology news & reviews from the future

Security vulnerabilities stories - Page 3

Realistic illustration hospital building digital shield cracks healthcare data security vulnerabilities

Healthcare sector slow to fix vulnerabilities despite strong prevention

Thu, 4th Sep 2025
#
data protection
#
devops
#
advanced persistent threat protection
Healthcare sector excels in preventing serious security flaws but takes nearly two months to fix them, risking sensitive data exposure amid rising cyber threats.
Bank building shadowy figures with laptops phishing hooks targeting employees illustration

Financial sector faces 25% jump in cyberattacks, led by phishing

Fri, 22nd Aug 2025
#
ransomware
#
phishing
#
advanced persistent threat protection
Cyberattacks on the financial sector have surged 25% in 2024, with phishing leading and nearly half of employees prone to clicking malicious links.
Digital illustration server room lock shattering abstract computational power

Quantum computing exposes Active Directory to urgent new risks

Fri, 8th Aug 2025
#
data protection
#
mfa
#
cloud security
Quantum computing presents urgent security risks for organisations relying on Microsoft Active Directory, as legacy systems struggle to meet new cryptographic demands.
Secure cloud with digital shields and floating code icons symbolizing cloud application protection

Palo Alto Networks unveils Cortex Cloud ASPM to block app risks

Fri, 8th Aug 2025
#
firewalls
#
cloud security
#
application security
Palo Alto Networks launches Cortex Cloud ASPM, a prevention-first tool to block security risks in cloud and AI apps before deployment, enhancing threat management.
Cloud shaped shield protecting developers at desks secure software development

Palo Alto upgrades Cortex Cloud to tackle AI-driven code risks

Thu, 7th Aug 2025
#
firewalls
#
devops
#
cloud security
Palo Alto Networks has enhanced Cortex Cloud with a new module to prevent AI-generated code risks, boosting security for faster, safer software development.
Security researcher analyzing complex network map with user icons clouds modern office

BeyondTrust launches Phantom Labs to boost identity security research

Tue, 5th Aug 2025
#
data science
#
iam
#
cybersecurity
BeyondTrust launches Phantom Labs, a specialised team to research identity security threats and enhance protection against identity exploitation in hybrid and cloud environments.
Developers engineers collaborating architectural diagrams code security modern office

Dawnguard raises USD $3m to embed security at design stage

Thu, 31st Jul 2025
#
devops
#
cloud security
#
apm
Amsterdam-based cybersecurity startup Dawnguard secures USD $3 million to embed security into system design, aiming to prevent risks from the development phase onwards.
Computer network shield icons alert symbols ai brain cybersecurity monitoring

Panaseer launches AI tool for real-time analysis of cyber risks

Wed, 30th Jul 2025
#
firewalls
#
network security
#
phishing
Panaseer has launched Key Drivers, an AI tool delivering real-time cybersecurity risk analysis to help organisations swiftly spot and address vulnerabilities.
Digital shield with crack and floating server racks warning symbols cybersecurity risk ai

AI deployment creates new cybersecurity risks, warns report

Wed, 30th Jul 2025
#
risk & compliance
#
ai
#
cybersecurity
Trend Micro warns that rapid AI deployment is exposing critical cybersecurity risks, with thousands of servers vulnerable to attacks due to unpatched and unsecured components.
Cloud with gears code shields surrounded by servers for it management

Azul launches Managed Services Programme for Java insights

Wed, 30th Jul 2025
#
application security
#
partner programmes
#
software development
Azul has launched a Managed Services Provider Programme to help partners offer Java asset management, security and code insights via its Intelligence Cloud platform.
Ps morey haber  1

The Identity Epidemic: Why your business's digital front door is under siege

Mon, 21st Jul 2025
#
firewalls
#
digital transformation
#
network security
Identities have become the prime target in cybersecurity, with businesses urged to secure digital access through ownership, least privilege, MFA, and secret management.
Developers collaborating on software security fixing vulnerabilities digital shield icons

Cycode & HackerOne integrate to speed software vulnerability fixes

Fri, 18th Jul 2025
#
application security
#
risk & compliance
#
cybersecurity
Cycode and HackerOne partner to integrate bug bounty findings into Cycode's platform, speeding up vulnerability fixes and improving software security workflows.
Network server rack with shadowy figure hidden threat enterprise office

Windows Server 2025 flaw lets attackers persist in Active Directory

Thu, 17th Jul 2025
#
advanced persistent threat protection
#
iam
#
erp
A design flaw in Windows Server 2025 allows attackers to persist undetected in Active Directory by exploiting managed service account vulnerabilities.
Multiple hands grabbing gift cards digital shopping cart simultaneous redemption online checkout

Race condition in nopCommerce gift cards enables repeated use

Fri, 11th Jul 2025
#
devops
#
apm
#
e-commerce
A race condition vulnerability in nopCommerce gift cards lets attackers redeem the same card repeatedly, exploiting a flaw in the checkout process.
Ps pascal geenens headshot 1  large

The risky race to AI: How DeepSeek is reshaping the AI landscape

Thu, 26th Jun 2025
#
data protection
#
breach prevention
#
ai security
Chinese startup DeepSeek's new AI model cuts costs but sparks global security fears, prompting bans and cyberattacks amid geopolitical tensions.
Modern office building split ai digital patterns and cracked security shields

Growing gap revealed between AI innovation & enterprise security

Thu, 26th Jun 2025
#
devops
#
supply chain
#
apm
A new report reveals a widening gap between AI innovation and enterprise security, with 36% of firms struggling to keep up with generative AI risks.
Digital security shield protecting interconnected app icons data streams

Outpost24 identifies key OAuth risks & best practice solutions

Sat, 21st Jun 2025
#
application security
#
iam
#
breach prevention
Outpost24 reveals seven common OAuth risks and offers best practices to help organisations prevent unauthorised access and data breaches through better token security.
Dark cloud over data servers glowing locks keys floating away risk

Poor cloud security leaves secrets & data at risk, report finds

Thu, 19th Jun 2025
#
hyperscale
#
public cloud
#
cloud security
A report finds poor cloud security and misconfigurations put sensitive data and secrets at risk across major public cloud providers worldwide.
Illustration smartphone laptop warning symbols fish hooks masked figures cyber threats apple devices

Jamf report finds phishing & infostealers surge on Apple devices

Wed, 18th Jun 2025
#
malware
#
endpoint protection
#
mdm
Jamf's Security 360 Report reveals a sharp rise in phishing and infostealers targeting Apple devices, urging organisations to strengthen cybersecurity measures.
Fishing hook email phishing threats targeting new zealand map illustration

Just 3% of New Zealand domains enforce top anti-phishing policy

Fri, 13th Jun 2025
#
edutech
#
data protection
#
phishing
Just 3% of New Zealand domains enforce the strict DMARC p=reject policy, leaving most vulnerable to phishing despite upcoming government mandates.