TelcoNews UK - Telecommunications news for ICT decision-makers

Common Vulnerabilities and Exposures (CVE) stories - Page 12

Story image
Azul launches a new Saas to secure software supply chain
Fri, 4th Nov 2022
#
saas
#
martech
#
supply chain
Azul’s Vulnerability Detection, the new SaaS product, continuously detects vulnerabilities in Java applications by eliminating false positives.
Story image
Claroty reveals new cryptographic key extraction method
Fri, 14th Oct 2022
#
healthtech
#
security vulnerabilities
#
information protection
Claroty's Team82 exposes major security vulnerabilities in Siemens PLCs and Dataprobe's PDUs, prompting urgent updates.
Story image
A deep dive into a Corporate Espionage operation
Tue, 4th Oct 2022
#
hyperscale
#
public cloud
#
phishing
Rise in hybrid cyberattacks targeting small companies sparks concern over vulnerability exploits, as corporate espionage becomes widespread.
Story image
Continuous attack attempts discovered on Atlassian Confluence zero day
Mon, 3rd Oct 2022
#
firewalls
#
ddos
#
breach prevention
Following a coordinated disclosure of a zero-day vulnerability by Volexity in Atlassian Confluence, attackers went wild to exploit it.
Story image
Black Lotus Labs discovers new, multipurpose malware
Fri, 30th Sep 2022
#
malware
#
ddos
#
cybersecurity
Black Lotus Labs, the threat intelligence team at Lumen, has discovered a new, rapidly growing, multipurpose malware written in the Go programming language.
Story image
Decrease in malware volume, but surge in encrypted malware
Thu, 29th Sep 2022
#
malware
#
firewalls
#
network infrastructure
The Q2 Internet Security Report found office exploits continue to spread more than any other category of malware.
Story image
Cybersecurity loopholes prevalent in South East Asia
Tue, 27th Sep 2022
#
advanced persistent threat protection
#
cybersecurity
#
healthtech
In terms of the share of vulnerabilities with publicly available exploits, three countries out of top five are located in Southeast Asia.
Story image
Trellix advances threat intelligence with new research centre
Tue, 27th Sep 2022
#
edutech
#
advanced persistent threat protection
#
supply chain
Trellix has announced the establishment of the Trellix Advanced Research Center to advance global threat intelligence.
Story image
August's top malware: Emotet knocked off top spot
Fri, 16th Sep 2022
#
malware
#
cybersecurity
#
healthtech
FormBook is now the most prevalent malware, taking over from Emotet, which has held that position since its reappearance in January.
Story image
Rapid7 issues vulnerability advisory for two Baxter devices
Tue, 13th Sep 2022
#
iot
#
advanced persistent threat protection
#
cybersecurity
Rapid7 has issued a vulnerability advisory for two Baxter Healthcare TCP/IP-enabled medical devices: SIGMA Spectrum Infusion Pump and SIGMA WiFi Battery.
Story image
How to protect against the growing fileless malware threat
Wed, 31st Aug 2022
#
malware
#
ddos
#
data protection
In 2017 the Ponemon Institute reported that fileless attacks are ten times more successful than file-based attacks.
Story image
Internet of Things vulnerability disclosures grew 57%
Fri, 26th Aug 2022
#
iot
#
cybersecurity
#
security vulnerabilities
Vulnerability disclosures impacting IoT devices increased by 57% in the first half of 2022 compared to the previous six months.
Story image
Ransomware variants almost double in six months – FortiGuard
Mon, 22nd Aug 2022
#
malware
#
ransomware
#
ndr
Exploit trends demonstrate the endpoint remains a target as work-from-anywhere continues, according to a new report.
Story image
Check Point Research finds vulnerabilities in Xiaomi's mobile payment mechanism
Thu, 18th Aug 2022
#
edutech
#
martech
#
commerce systems
Check Point Software uncovers vulnerabilities in Xiaomi's mobile payment system, potentially affecting up to 1 billion users. Fixes have been provided.
Story image
‘Windows shops’ target admin rights to de-risk their environments
Wed, 17th Aug 2022
#
cybersecurity
#
windows
#
users
New data shows up to 75% of critical vulnerabilities could be mitigated through a rights and privileges crackdown.
Story image
8x more users attacked via old Microsoft Office vulnerability in Q2
Wed, 17th Aug 2022
#
cybersecurity
#
microsoft
#
kaspersky
Exploits for vulnerabilities in Microsoft Office have surged, accounting for 82% of total exploits in Q2 2022, according to Kaspersky.
Story image
Tenable makes additions to Cloud Security portfolio
Fri, 12th Aug 2022
#
devops
#
cloud security
#
multi-cloud
Tenable has announced additions to Tenable Cloud Security that represent the next step in assessing threats related to cloud vulnerabilities.
Story image
Nozomi Networks Labs identifies impacts on 2022 threat landscape
Thu, 4th Aug 2022
#
malware
#
edutech
#
iot security
Nozomi Networks' latest research reveals wiper malware, IoT botnet activity, and the Russia/Ukraine war as key threats in 2022.
Story image
Claroty's Team82 uncovers two vulnerabilities in FileWave’s MDM system
Fri, 29th Jul 2022
#
uc
#
mdm
#
breach prevention
Claroty’s research arm (Team82) has uncovered and disclosed two critical vulnerabilities in FileWave’s Mobile Device Management (MDM) system.
Story image
Aqua Security unveils out-of-the-box runtime protection
Tue, 26th Jul 2022
#
data protection
#
cloud security
#
application security
Aqua Security has launched out-of-the-box runtime protection with minimal configuration to stop attacks in real-time on running workloads.