Common Vulnerabilities and Exposures (CVE) stories - Page 19

Malware downloader on the rise in Check Point’s latest Threat Index
Wed, 16th Jan 2019
#
malware
#
cybersecurity
#
report
Organisations continue to be targeted by cryptominers, despite an overall drop in value across all cryptocurrencies in 2018.

Meet Rentbot, the chatbot that can help with tenancy law
Mon, 10th Dec 2018
#
uc
#
martech
#
agentic ai
If you find yourself in a tricky situation - or if you just want to understand your rights as a landlord or tenant, you can now turn to a chatbot for help.

2018’s worst malware revealed in report
Fri, 2nd Nov 2018
#
malware
#
ransomware
#
ai security
Webroot’s 2018 Nastiest Malware report highlights Emotet, Trickbot, and GhostMiner as the latest threats, urging improved cybersecurity measures.

Huge vulnerabilities in software supply chain being exploited
Thu, 4th Oct 2018
#
devops
#
supply chain
#
apm
A very exposing report has revealed breaches are rising and response times are falling, largely due to shoddy software development practices.

Cyber threat spotlight: Kiwis report more, lose less in Q2
Wed, 19th Sep 2018
#
firewalls
#
network infrastructure
#
network security
CERT NZ's latest report shows cyber threats and incident reports increased in Q2, yet monetary losses dropped by 24%, with most under NZD $500.

2018 proves to be a mixed bag of severe cyber threats, report finds
Mon, 17th Sep 2018
#
malware
#
firewalls
#
network infrastructure
2018 saw a surge in cyber threats with over 30 zero-day vulnerabilities and nearly 24,000 unique malware variants, Fortinet's report reveals.

Quick thinking remedies vulnerability in Schneider Electric ICS controller
Fri, 7th Sep 2018
#
datacentre infrastructure
#
power / energy
#
schneider electric
Radiflow discovered that a serious vulnerability in the devices put the safety and availability of ICS networks in jeopardy.

MikroTik routers in NZ may be at risk of cryptomining - Symantec
Mon, 20th Aug 2018
#
symantec
#
router
#
security vulnerabilities
New Zealand's MikroTik routers may be at risk of cryptomining attacks due to a global campaign targeting 157,000 devices, warns Symantec. Install patches.

Over 2,300 data breaches disclosed so far in 2018 - report
Mon, 20th Aug 2018
#
phishing
#
email security
#
breach prevention
Phishing for and using the stolen credentials to access systems or services stands out as a particularly popular attack method.

Exclusive interview: Major MFA vulnerability discovered in Microsoft’s ADFS
Wed, 15th Aug 2018
#
mfa
#
iam
#
microsoft
A critical flaw in Microsoft's ADFS allows bypassing MFA, posing a severe risk, warns Okta’s REX team. Urgent patching is recommended for users.

Mobile apps are now a crucial part of event promotion
Tue, 14th Aug 2018
#
digital transformation
#
mobile apps
#
cvent australia
If you’re thinking of running an event, a mobile app is not just a nice feature but an essential part of event promotion.

A deep dive into the present and future of retail off- and online
Wed, 1st Aug 2018
#
martech
#
commerce systems
#
omnichannel
Russell McVeagh Special Counsel Liz Blythe examines the opportunities and risks associated with the eye-wateringly quick pace of change in the sector.

Exclusive: Why open source is critical to software development
Mon, 23rd Jul 2018
#
dr
#
cloud security
#
open source
Pivotal APJ head Lawrence Crowther discusses the importance of open source and cloud in modern software development.

GitHub rolls out security alerts feature for Python
Mon, 16th Jul 2018
#
martech
#
apm
#
software development
GitHub adds security alerts for Python, allowing users to be notified when their code depends on packages with known vulnerabilities.

Use of banking trojans up 50%, cryptomining still dominant malware – report
Tue, 10th Jul 2018
#
malware
#
cybersecurity
#
trojan
Check Point’s latest Global Threat Index reveals that Trojan malware families enter Top 10 Most Wanted Ranking; Cryptomining remains top of the list.

The top four security strategies and why they’re so effective
Mon, 21st May 2018
#
malware
#
ransomware
#
cybersecurity
The top four cybersecurity strategies, including application whitelisting and patching, are proving highly effective against 85% of attacks like ransomware.

Noel Leeming hit by nine charges of breaching consumer rights
Mon, 30th Apr 2018
#
commerce commission
#
noel leeming
#
the warehouse group
The consumer retail, owned by The Warehouse Group, will defend the nine charges, each laid by different customers, in court at the end of May.

No need for a browser - XMRig cryptomining malware enters top 10 most wanted malware list
Mon, 16th Apr 2018
#
blockchain
#
cryptocurrency
#
cryptomining
Cryptomining malware is shifting its focus from browsers to endpoints, with XMRig rising in popularity among cybercriminals.

'URL file outbreak' used to distribute Quant Loader Trojan
Wed, 11th Apr 2018
#
malware
#
firewalls
#
ransomware
Barracuda Networks is tracking a potentially dangerous ‘URL file outbreak’ that distribute the Quant Loader Trojan.

Attackers exploit macro-less Office documents to create havoc
Tue, 3rd Apr 2018
#
malware
#
firewalls
#
network infrastructure
Cybercriminals use Microsoft Office documents to conduct ‘macro-less’ attacks that dodge organisations’ defences and inject malware.