Common Vulnerabilities and Exposures (CVE) stories - Page 19
IBM X-Force Red & Qualys introduce automated patching
Tue, 19th Feb 2019
#
ibm
#
security vulnerabilities
#
patching
IBM X-Force Red and Qualys are declaring a war on unpatched systems, and they believe automation is the answer.
New threat rears its head in new malware report
Thu, 14th Feb 2019
#
malware
#
cybersecurity
#
cryptomalware
Check Point's researchers view Speakup as a significant threat, as it can be used to download and spread any malware.
OT attacks and cryptominers on the rise – Skybox
Wed, 30th Jan 2019
#
cloud security
#
iot security
#
report
Skybox Security's 2019 Vulnerability and Threat Trends Report analyzes what shaped the threat landscape over 2018 and what it means for the year ahead.
Malware downloader on the rise in Check Point's latest Threat Index
Wed, 16th Jan 2019
#
malware
#
cybersecurity
#
report
Organisations continue to be targeted by cryptominers, despite an overall drop in value across all cryptocurrencies in 2018.
2018's worst malware revealed in report
Fri, 2nd Nov 2018
#
malware
#
ransomware
#
ai security
Webroot's 2018 Nastiest Malware report highlights Emotet, Trickbot, and GhostMiner as the latest threats, urging improved cybersecurity measures.
Huge vulnerabilities in software supply chain being exploited
Thu, 4th Oct 2018
#
devops
#
supply chain
#
apm
A very exposing report has revealed breaches are rising and response times are falling, largely due to shoddy software development practices.
Quick thinking remedies vulnerability in Schneider Electric ICS controller
Fri, 7th Sep 2018
#
datacentre infrastructure
#
power / energy
#
schneider electric
Radiflow discovered that a serious vulnerability in the devices put the safety and availability of ICS networks in jeopardy.
Over 2,300 data breaches disclosed so far in 2018 - report
Mon, 20th Aug 2018
#
phishing
#
email security
#
breach prevention
Phishing for and using the stolen credentials to access systems or services stands out as a particularly popular attack method.
Exclusive interview: Major MFA vulnerability discovered in Microsoft's ADFS
Wed, 15th Aug 2018
#
mfa
#
iam
#
cybersecurity
A critical flaw in Microsoft's ADFS allows bypassing MFA, posing a severe risk, warns Okta's REX team. Urgent patching is recommended for users.
A deep dive into the present and future of retail off- and online
Wed, 1st Aug 2018
#
martech
#
commerce systems
#
omnichannel
Russell McVeagh Special Counsel Liz Blythe examines the opportunities and risks associated with the eye-wateringly quick pace of change in the sector.
Exclusive: Why open source is critical to software development
Mon, 23rd Jul 2018
#
dr
#
cloud security
#
open source
Pivotal APJ head Lawrence Crowther discusses the importance of open source and cloud in modern software development.
GitHub rolls out security alerts feature for Python
Mon, 16th Jul 2018
#
martech
#
apm
#
software development
GitHub adds security alerts for Python, allowing users to be notified when their code depends on packages with known vulnerabilities.
Use of banking trojans up 50%, cryptomining still dominant malware – report
Tue, 10th Jul 2018
#
malware
#
cybersecurity
#
trojan
Check Point's latest Global Threat Index reveals that Trojan malware families enter Top 10 Most Wanted Ranking; Cryptomining remains top of the list.
The top four security strategies and why they're so effective
Mon, 21st May 2018
#
malware
#
ransomware
#
cybersecurity
The top four cybersecurity strategies, including application whitelisting and patching, are proving highly effective against 85% of attacks like ransomware.
No need for a browser - XMRig cryptomining malware enters top 10 most wanted malware list
Mon, 16th Apr 2018
#
crypto
#
blockchain
#
cryptomining
Cryptomining malware is shifting its focus from browsers to endpoints, with XMRig rising in popularity among cybercriminals.
Attackers exploit macro-less Office documents to create havoc
Tue, 3rd Apr 2018
#
malware
#
firewalls
#
network infrastructure
Cybercriminals use Microsoft Office documents to conduct 'macro-less' attacks that dodge organisations' defences and inject malware.
New research finds China tampering with public vulnerability data
Mon, 12th Mar 2018
#
cybersecurity
#
fraud
#
cybercrime
Recorded Future believes China has been altering public vulnerability data to allow the Ministry of State Security to play with it first.
REPORT: Ransomware decreasing in quantity but increasing in potency
Wed, 7th Mar 2018
#
malware
#
ransomware
#
supply chain
A new report from SonicWall has shed light on the current threat landscape with the company recording an astonishing 9.32b malware attacks in 2017.
State-sponsored North Korean cyberespionage group continues to weaponize tactics
Wed, 21st Feb 2018
#
breach prevention
#
healthtech
#
fireeye
The North Korean threat group known to some as Reaper (APT37) is eyeing bigger targets with more sophisticated tactics.
New email spam campaign ditches traditional Office macro infection tactic
Mon, 19th Feb 2018
#
malware
#
email security
#
cybersecurity
A new wave of spam emails use Microsoft Office documents to download password stealers without having to activate Macros.