TelcoNews UK - Telecommunications news for ICT decision-makers

Common Vulnerabilities and Exposures (CVE) stories - Page 19

Story image
Malware downloader on the rise in Check Point’s latest Threat Index
Wed, 16th Jan 2019
#
malware
#
cybersecurity
#
report
Organisations continue to be targeted by cryptominers, despite an overall drop in value across all cryptocurrencies in 2018.
Story image
Meet Rentbot, the chatbot that can help with tenancy law
Mon, 10th Dec 2018
#
uc
#
martech
#
agentic ai
If you find yourself in a tricky situation  - or if you just want to understand your rights as a landlord or tenant, you can now turn to a chatbot for help.
Story image
2018’s worst malware revealed in report
Fri, 2nd Nov 2018
#
malware
#
ransomware
#
ai security
Webroot’s 2018 Nastiest Malware report highlights Emotet, Trickbot, and GhostMiner as the latest threats, urging improved cybersecurity measures.
Story image
Huge vulnerabilities in software supply chain being exploited
Thu, 4th Oct 2018
#
devops
#
supply chain
#
apm
A very exposing report has revealed breaches are rising and response times are falling, largely due to shoddy software development practices.
Story image
Cyber threat spotlight: Kiwis report more, lose less in Q2
Wed, 19th Sep 2018
#
firewalls
#
network infrastructure
#
network security
CERT NZ's latest report shows cyber threats and incident reports increased in Q2, yet monetary losses dropped by 24%, with most under NZD $500.
Story image
2018 proves to be a mixed bag of severe cyber threats, report finds
Mon, 17th Sep 2018
#
malware
#
firewalls
#
network infrastructure
2018 saw a surge in cyber threats with over 30 zero-day vulnerabilities and nearly 24,000 unique malware variants, Fortinet's report reveals.
Story image
Quick thinking remedies vulnerability in Schneider Electric ICS controller
Fri, 7th Sep 2018
#
datacentre infrastructure
#
power / energy
#
schneider electric
Radiflow discovered that a serious vulnerability in the devices put the safety and availability of ICS networks in jeopardy.
Story image
MikroTik routers in NZ may be at risk of cryptomining - Symantec
Mon, 20th Aug 2018
#
symantec
#
router
#
security vulnerabilities
New Zealand's MikroTik routers may be at risk of cryptomining attacks due to a global campaign targeting 157,000 devices, warns Symantec. Install patches.
Story image
Over 2,300 data breaches disclosed so far in 2018 - report
Mon, 20th Aug 2018
#
phishing
#
email security
#
breach prevention
Phishing for and using the stolen credentials to access systems or services stands out as a particularly popular attack method.
Story image
Exclusive interview: Major MFA vulnerability discovered in Microsoft’s ADFS
Wed, 15th Aug 2018
#
mfa
#
iam
#
microsoft
A critical flaw in Microsoft's ADFS allows bypassing MFA, posing a severe risk, warns Okta’s REX team. Urgent patching is recommended for users.
Story image
Mobile apps are now a crucial part of event promotion
Tue, 14th Aug 2018
#
digital transformation
#
mobile apps
#
cvent australia
If you’re thinking of running an event, a mobile app is not just a nice feature but an essential part of event promotion.
Story image
A deep dive into the present and future of retail off- and online
Wed, 1st Aug 2018
#
martech
#
commerce systems
#
omnichannel
Russell McVeagh Special Counsel Liz Blythe examines the opportunities and risks associated with the eye-wateringly quick pace of change in the sector.
Story image
Exclusive: Why open source is critical to software development
Mon, 23rd Jul 2018
#
dr
#
cloud security
#
open source
Pivotal APJ head Lawrence Crowther discusses the importance of open source and cloud in modern software development.
Story image
GitHub rolls out security alerts feature for Python
Mon, 16th Jul 2018
#
martech
#
apm
#
software development
GitHub adds security alerts for Python, allowing users to be notified when their code depends on packages with known vulnerabilities.
Story image
Use of banking trojans up 50%, cryptomining still dominant malware – report
Tue, 10th Jul 2018
#
malware
#
cybersecurity
#
trojan
Check Point’s latest Global Threat Index reveals that Trojan malware families enter Top 10 Most Wanted Ranking; Cryptomining remains top of the list.
Story image
The top four security strategies and why they’re so effective
Mon, 21st May 2018
#
malware
#
ransomware
#
cybersecurity
The top four cybersecurity strategies, including application whitelisting and patching, are proving highly effective against 85% of attacks like ransomware.
Story image
Noel Leeming hit by nine charges of breaching consumer rights
Mon, 30th Apr 2018
#
commerce commission
#
noel leeming
#
the warehouse group
The consumer retail, owned by The Warehouse Group, will defend the nine charges, each laid by different customers, in court at the end of May.
Story image
No need for a browser - XMRig cryptomining malware enters top 10 most wanted malware list
Mon, 16th Apr 2018
#
blockchain
#
cryptocurrency
#
cryptomining
Cryptomining malware is shifting its focus from browsers to endpoints, with XMRig rising in popularity among cybercriminals.
Story image
'URL file outbreak' used to distribute Quant Loader Trojan
Wed, 11th Apr 2018
#
malware
#
firewalls
#
ransomware
Barracuda Networks is tracking a potentially dangerous ‘URL file outbreak’ that distribute the Quant Loader Trojan.
Story image
Attackers exploit macro-less Office documents to create havoc
Tue, 3rd Apr 2018
#
malware
#
firewalls
#
network infrastructure
Cybercriminals use Microsoft Office documents to conduct ‘macro-less’ attacks that dodge organisations’ defences and inject malware.