CFOtech Australia - Technology news for CFOs & financial decision-makers

Security vulnerabilities stories

Story image
Armis achieves Australian IRAP Protected level certification
Last week
#
cybersecurity
#
australian government
#
public sector
Armis achieves Protected classification through IRAP assessment, bolstering cybersecurity offerings for Australian public sector entities amidst rising foreign threats.
Story image
AttackIQ launches Mission Control to simplify BAS management
This month
#
devops
#
apm
#
cybersecurity
AttackIQ launches Mission Control, enhancing Enterprise Breach and Attack Simulation for distributed teams. The new feature aims to streamline security testing and improve ROI.
Story image
New data breaches spark cybersecurity fears as Twilio confirms attack
This month
#
breach prevention
#
security vulnerabilities
#
mfa
ShinyHunters claimed responsibility for compromising 33 million Twilio users' phone numbers via the Authy 2FA app, sparking major security concerns.
Story image
Patch Tuesday has revealed 139 vulnerabilities
This month
#
cybersecurity
#
sql server
#
sharepoint
Microsoft's July 2024 Patch Tuesday reveals 139 vulnerabilities, including two zero-days under active exploitation: Hyper-V's EoP and MSHTML Spoofing.
Story image
Endor Labs warns of critical vulnerabilities in CocoaPods
This month
#
malware
#
cybersecurity
#
uber
Endor Labs reveals major security flaws in CocoaPods, threatening apps like Instagram and Uber. Critical CVEs could impact Swift and Objective-C supply chains.
Story image
Experts urge tech firms to prioritise secure-by-design principles
Last month
#
advanced persistent threat protection
#
ai
#
cybersecurity
With tech giants grappling with data breaches and security flaws, experts stress the urgent need for multifactor authentication and stronger identity security to protect against rising cyber threats.
Story image
Outdated tech obstructing innovation, says NTT DATA report
Last month
#
cleantech
#
business continuity
#
sustainability
NTT DATA’s 2024 Infrastructure Lifecycle Management Report finds 80% of global firms hindered by outdated tech. ANZ leads with 100% of executives reporting impaired business agility due to legacy systems.
Story image
Ricoh partners with Rimini Street for Oracle system support
Last month
#
ricoh
#
oracle
#
printing
Ricoh partners with Rimini Street to support and protect its Oracle systems, aiming to optimise current systems while exploring a next-gen ERP strategy.
Story image
Mindgard wins UK's Most Innovative Cyber SME award for 2024
Last month
#
devops
#
apm
#
ai
Mindgard, an AI-focused cyber security startup, wins UK's Most Innovative Cyber SME 2024 at Infosecurity Europe for its groundbreaking AI Security Labs platform.
Story image
Appdome launches SDKProtect to secure mobile development
Last month
#
endpoint protection
#
surveillance
#
application security
Appdome launches SDKProtect to enhance mobile SDK security. This service aims to counteract threats like root detection evasion and data tampering, ensuring safer applications.
Story image
Three-quarters of UK software supply chains hit by cyber attacks
Last month
#
smartphones
#
encryption
#
risk & compliance
BlackBerry's research unveiled at Infosecurity Europe shows 74% of UK software supply chains faced cyber attacks in the past year, exposing critical vulnerabilities.
Story image
Bitdefender report finds Discord rife with malware & scams
Last month
#
malware
#
email security
#
cybersecurity
Bitdefender's report uncovers Discord as a hotbed for malware, phishing, and scams, with 50,000 dangerous links detected in six months, targeting Australia and Indonesia among others.
Story image
Notes on ThroughTek Kalay Vulnerabilities and Their Impact on the IoT Ecosystem
Thu, 23rd May 2024
#
cybersecurity
#
iot
#
security vulnerabilities
ThroughTek Kalay's platform vulnerabilities affect over 100 million IoT devices, exposing them to potential attacks. Vendors race to patch issues.
Story image
Study reveals major vulnerabilities in operational technology
Wed, 22nd May 2024
#
pam
#
physical security
#
claroty
A Claroty study reveals that 13% of operational technology assets have insecure internet connections and 36% have known exploited vulnerabilities, posing severe cybersecurity risks.
Story image
GitLab reveals AI-driven updates for enhanced DevSecOps platform
Mon, 20th May 2024
#
devsecops
#
application security
#
ai
GitLab has announced cutting-edge AI-driven updates to its DevSecOps platform, including Duo Enterprise and CI/CD catalog, promising enhanced security and efficiency.
Story image
Is cloud complexity the biggest security threat of our time?
Tue, 14th May 2024
#
cloud security
#
iaas
#
cnapp
Australian businesses grapple with security vulnerabilities due to rising cloud complexity, leading to increased cyber threats and corporate survival issues.
Story image
Radware lauded as Leader in GigaOm's 2024 AAS Security Report
Thu, 9th May 2024
#
ai
#
cybersecurity
#
gigaom
Radware excels in GigaOm's 2024 AAS Security Report, gaining recognition as the only vendor to score top marks for AI-based vulnerability detection and bot management.
Story image
Semperis intensifies efforts with Veritas on ransomware defence
Thu, 9th May 2024
#
dr
#
ransomware
#
encryption
Semperis bolsters partnership with Veritas Technologies, enhancing cyber resilience against ransomware threats by using advanced attack-path analysis methods, streamlining data protection methods.
Story image
Claroty reveals flaw in traditional cyber-physical systems defence
Wed, 8th May 2024
#
physical security
#
claroty
#
cyber risk
Cyber security firm Claroty exposes a critical flaw in current vulnerability management strategies, revealing a colossal 38% of the riskiest cyber-physical system (CPS) assets go undetected by conventional methods.
Story image
ForAllSecure unveils AI-powered SBOM tool Mayhem to target real threats
Wed, 8th May 2024
#
advanced persistent threat protection
#
application security
#
supply chain systems
ForAllSecure reveals new AI-powered tool, Mayhem, a dynamic software bill of materials tool that proactively battles exploitable application vulnerabilities.