CFOtech Australia - Technology news for CFOs & financial decision-makers

Common Vulnerabilities and Exposures (CVE) stories - Page 8

Img tshdzqjpflz2cewct86yzwrf

Hackuity achieves SOC 2 Type II compliance for data security

Wed, 21st Feb 2024
#
risk & compliance
#
security vulnerabilities
#
data security
Hackuity, the RBVM company, attains SOC 2 Type II compliance, showcasing strong data security and compliance that uphold rigorous American standards, providing customers with enterprise-grade security assurance.
Img 2zbmmpdip0ifiurys77xgnlz

Armis acquires CTCI, forms AI-powered cybersecurity powerhouse

Thu, 15th Feb 2024
#
ai
#
cybersecurity
#
threat intelligence
Armis acquires AI threat intelligence firm, CTCI, boosting its forecast abilities and creating a powerful new Global Threat Intelligence Service.
Img q8hrdspcrveuw2zswdbfcesl

Trend Micro uncovers Water Hydra's Windows Defender exploit

Thu, 15th Feb 2024
#
ransomware
#
edr
#
cybersecurity
Trend Micro discloses critical zero-day vulnerability in Windows Defender, under malicious exploitation by cyber-threat group, Water Hydra, endangering millions of users globally.
Img ivs1dwo5jqki5n0pfksy5ixo

Rising threats to operational tech & IoT networks, warns Nozomi

Tue, 13th Feb 2024
#
firewalls
#
network security
#
iot security
Network case anomalies surge 19%, marking a rising and sophisticated threat to operational technology and IoT environments, with manufacturing vulnerabilities rocketing 230%, warns Nozomi Networks Labs.
Img mkssagy2efehi0rnmjy42x4x

Threat spotlight - How attackers are targeting your web applications right now

Thu, 8th Feb 2024
#
firewalls
#
ddos
#
supply chain
Cyberattacks on web applications have surged, Barracuda has defended against over 18bn such attacks in 2023 alone, with web apps providing a prime target for cyber attackers due to vulnerabilities and valuable data.
Img pnshhkfoiy69omcwwmddikjb

Milestone Systems teams up with CVE Program for cybersecurity

Wed, 7th Feb 2024
#
digital entertainment
#
video
#
transparency
Video technology leader, Milestone Systems, partners with the Common Vulnerability and Exposures Program, furthering transparency and cooperation in addressing cybersecurity threats.
Cybersecurity trends

2024 cybersecurity trends: AI, cloud and threat intelligence

Tue, 23rd Jan 2024
#
cloud security
#
application security
#
supply chain
We see 2024 shaping up to be the defining moment where AI may become the profound battleground in cybersecurity.
Img bwuqvdhmxt9lyttvb8q84ynu

Cyber attacks double, utilities & manufacturing hardest hit

Tue, 23rd Jan 2024
#
advanced persistent threat protection
#
cybersecurity
#
cto
Armis's report shows cyber attacks globally doubled in 2023, with utilities and manufacturing sectors the hardest hit.
Img arv0qgr97geqjq8qhrl2cdo2

Less than 1% vulnerabilities pose highest risk in 2023, finds Qualys

Thu, 18th Jan 2024
#
malware
#
ransomware
#
advanced persistent threat protection
Less than 1% of security vulnerabilities created the highest risks to businesses in 2023, with 97 high-risk vulnerabilities exploited undetected, says Qualys Threat Research Unit report.
Img gk1dq3e1nthqfldg2ayqwfez

Ivanti VPN vulnerabilities exploited by suspected espionage group UNC5221

Mon, 15th Jan 2024
#
malware
#
vpns
#
advanced persistent threat protection
Suspected espionage group UNC5221 exploited two zero-day vulnerabilities in Ivanti VPN and security appliances, using multiple custom malware families for post-exploitation espionage.
Img bbtjoeroeexskotw4vlzxjwv

Software security strains under supply chain complexity, Slim.AI reveals

Fri, 5th Jan 2024
#
supply chain
#
ai
#
cybersecurity
Over 40% of firms struggle to tackle vulnerabilities in the rising complexity of software supply chains, despite sizeable resource allocation, says Slim.AI's recent Container Report.
Img unz2oto4dkfidv8qdma1gjiu

Operation Triangulation: Undocumented iPhone hardware feature exposed

Thu, 28th Dec 2023
#
devops
#
apm
#
software development
Kaspersky's GReAT team has uncovered an undisclosed iPhone hardware feature used in Operation Triangulation attacks.
Erin stephan

Beware the lasting legacy of the Log4j vulnerability

Mon, 18th Dec 2023
#
application security
#
open source
#
software development
Efforts to mitigate the Log4j vulnerability involve updating to patched versions of Log4j, but the process continues to be complex.
Img ddui8yiwhalehzm6l72btco2

Claroty Team82 discovers cybersecurity threats to industrial automation systems

Thu, 14th Dec 2023
#
data analytics
#
rpa
#
cybersecurity
Team82 at Claroty uncovers substantial cybersecurity vulnerabilities in Operational Technology protocol clients, showing potential for full system control.
Kristen nolan headshot 1

Aqua Security on how to navigate the Cloud's complexities

Fri, 8th Dec 2023
#
devops
#
fintech
#
application security
With all the benefits the cloud has to offer, it also introduces a new set of challenges, particularly for industries where security and compliance are priorities.
Img owvyeavvumb28gu0ogqyuqpv

OpenSSF announces new members & secure software development principles

Tue, 5th Dec 2023
#
advanced persistent threat protection
#
open source
#
ai
OpenSSF introduces new members including Patchstack and SparkFabrik, and outlines secure software development principles.
Img gboizwjo8aly3bavwovnptju

Rising cybersecurity threats prompt shift from traditional password methods

Mon, 27th Nov 2023
#
mfa
#
advanced persistent threat protection
#
email security
Rising cybersecurity threats prompt a shift from traditional, vulnerable password methods to phishing-resistant authentication solutions.
Rat

Check Point reveals rise of NJRat & AgentTesla in cyber threat landscape

Thu, 9th Nov 2023
#
endpoint protection
#
edr
#
online shopping
Check Point's latest Global Threat Index exposes a surge in Remote Access Trojan NJRat and an AgentTesla campaign.
Workflow

Action1 set to boost enterprise IT security with automated remediation workflows

Mon, 6th Nov 2023
#
cx
#
martech
#
data privacy
Action1 Corp. is releasing an enterprise IT security solution integrating automated vulnerability remediation workflows.
Cybersecurity 3

CAST unveils autumn release of software intelligence product

Fri, 27th Oct 2023
#
public cloud
#
microsoft
#
cloud services
CAST has launched their autumn release of software intelligence product, CAST Highlight, designed to enhance cloud migration and optimisation.