TelcoNews UK - Telecommunications news for ICT decision-makers

Common Vulnerabilities and Exposures (CVE) stories - Page 7

Story image
Trustwave reveals cybersecurity threats targeting education sector
Fri, 23rd Feb 2024
#
edutech
#
data privacy
#
higher education
Cybersecurity firm Trustwave has revealed unique threats facing the education sector in their latest analysis, 2024 Education Threat Landscape, offering key strategies for building cybersecurity resilience.
Story image
Take a closer look at your company's software supply chain
Wed, 21st Feb 2024
#
saas
#
malware
#
paas
Amid the rise of remote work and cloud technology, firms face increased cyber security risks from poorly managed software supply chains, warns industry expert.
Story image
Hackuity achieves SOC 2 Type II compliance for data security
Wed, 21st Feb 2024
#
risk & compliance
#
security vulnerabilities
#
data security
Hackuity, the RBVM company, attains SOC 2 Type II compliance, showcasing strong data security and compliance that uphold rigorous American standards, providing customers with enterprise-grade security assurance.
Story image
Armis acquires CTCI, forms AI-powered cybersecurity powerhouse
Thu, 15th Feb 2024
#
ai
#
cybersecurity
#
threat intelligence
Armis acquires AI threat intelligence firm, CTCI, boosting its forecast abilities and creating a powerful new Global Threat Intelligence Service.
Story image
Trend Micro uncovers Water Hydra's Windows Defender exploit
Thu, 15th Feb 2024
#
ransomware
#
edr
#
cybersecurity
Trend Micro discloses critical zero-day vulnerability in Windows Defender, under malicious exploitation by cyber-threat group, Water Hydra, endangering millions of users globally.
Story image
Rising threats to operational tech & IoT networks, warns Nozomi
Tue, 13th Feb 2024
#
firewalls
#
network security
#
iot security
Network case anomalies surge 19%, marking a rising and sophisticated threat to operational technology and IoT environments, with manufacturing vulnerabilities rocketing 230%, warns Nozomi Networks Labs.
Story image
Increasing cyber resilience through CISM training in NZ
Mon, 12th Feb 2024
#
it training
#
soc
#
cybersecurity
We must invest in developing skilled cybersecurity professionals to sustain and build upon this positive momentum.
Story image
Threat spotlight - How attackers are targeting your web applications right now
Thu, 8th Feb 2024
#
firewalls
#
ddos
#
supply chain
Cyberattacks on web applications have surged, Barracuda has defended against over 18bn such attacks in 2023 alone, with web apps providing a prime target for cyber attackers due to vulnerabilities and valuable data.
Story image
Milestone Systems teams up with CVE Program for cybersecurity
Wed, 7th Feb 2024
#
digital entertainment
#
video
#
transparency
Video technology leader, Milestone Systems, partners with the Common Vulnerability and Exposures Program, furthering transparency and cooperation in addressing cybersecurity threats.
Story image
BackBox celebrates record growth & innovation in 2023
Fri, 26th Jan 2024
#
network infrastructure
#
risk & compliance
#
cloud services
BackBox, a network team automation firm, reported stellar growth in 2023, showcasing strong expansion and significant growth in clientele.
Story image
2024 cybersecurity trends: AI, cloud and threat intelligence
Tue, 23rd Jan 2024
#
cloud security
#
application security
#
supply chain
We see 2024 shaping up to be the defining moment where AI may become the profound battleground in cybersecurity.
Story image
Cyber attacks double, utilities & manufacturing hardest hit
Tue, 23rd Jan 2024
#
advanced persistent threat protection
#
cybersecurity
#
cto
Armis's report shows cyber attacks globally doubled in 2023, with utilities and manufacturing sectors the hardest hit.
Story image
Less than 1% vulnerabilities pose highest risk in 2023, finds Qualys
Thu, 18th Jan 2024
#
malware
#
ransomware
#
advanced persistent threat protection
Less than 1% of security vulnerabilities created the highest risks to businesses in 2023, with 97 high-risk vulnerabilities exploited undetected, says Qualys Threat Research Unit report.
Story image
Ivanti VPN vulnerabilities exploited by suspected espionage group UNC5221
Mon, 15th Jan 2024
#
malware
#
vpns
#
advanced persistent threat protection
Suspected espionage group UNC5221 exploited two zero-day vulnerabilities in Ivanti VPN and security appliances, using multiple custom malware families for post-exploitation espionage.
Story image
Software security strains under supply chain complexity, Slim.AI reveals
Fri, 5th Jan 2024
#
supply chain
#
ai
#
cybersecurity
Over 40% of firms struggle to tackle vulnerabilities in the rising complexity of software supply chains, despite sizeable resource allocation, says Slim.AI's recent Container Report.
Story image
Kaspersky discovers dual-threat NKAbuse malware in Latin America and Vietnam
Fri, 5th Jan 2024
#
malware
#
ddos
#
blockchain
Cybersecurity firm Kaspersky uncovers a new potent malware, NKAbuse, exploiting the NKN technology to launch twin threats as a flooder and a backdoor/RAT, with victims emerging in Colombia, Mexico, and Vietnam.
Story image
Operation Triangulation: Undocumented iPhone hardware feature exposed
Thu, 28th Dec 2023
#
devops
#
apm
#
software development
Kaspersky's GReAT team has uncovered an undisclosed iPhone hardware feature used in Operation Triangulation attacks.
Story image
UK experienced more than 17 million daily cyber attacks in 2023
Wed, 20th Dec 2023
#
malware
#
firewalls
#
ransomware
UK faces around 17 million daily cyber attacks in 2023, with most targeting remote desktop protocol, says Coalition.
Story image
Beware the lasting legacy of the Log4j vulnerability
Mon, 18th Dec 2023
#
application security
#
open source
#
software development
Efforts to mitigate the Log4j vulnerability involve updating to patched versions of Log4j, but the process continues to be complex.
Story image
Claroty Team82 discovers cybersecurity threats to industrial automation systems
Thu, 14th Dec 2023
#
data analytics
#
rpa
#
cybersecurity
Team82 at Claroty uncovers substantial cybersecurity vulnerabilities in Operational Technology protocol clients, showing potential for full system control.