TechDay New Zealand - Aotearoa's technology news network

Common Vulnerabilities and Exposures (CVE) stories - Page 6

Img 1s1ddoeek8wuauti4gqhfqqr
GitHub flaw raises alarm over supply chain security risks
Fri, 24th May 2024
#
supply chain
#
cybersecurity
#
software development
A new vulnerability in GitHub Enterprise Server allowing attackers to bypass authentication has raised alarms over supply chain attacks, urging immediate software updates.
Img gubmuonaeycfbw9zb9cjy04d
Notes on ThroughTek Kalay Vulnerabilities and Their Impact on the IoT Ecosystem
Thu, 23rd May 2024
#
iot
#
cybersecurity
#
bitdefender
ThroughTek Kalay's platform vulnerabilities affect over 100 million IoT devices, exposing them to potential attacks. Vendors race to patch issues.
Img z4tup2b9pnsx6ctfvdib5g85
Rapid7's 2024 report reveals surge in zero-day exploits
Wed, 22nd May 2024
#
mfa
#
advanced persistent threat protection
#
exploits
Rapid7’s 2024 Attack Intelligence Report highlights a sharp rise in zero-day vulnerabilities causing mass breaches and underscores the necessity for faster patching and robust MFA protocols.
Img druurvyliy0hff0cuq3ao4x9
Microsoft addresses 59 CVEs including critical zero-day flaws
Thu, 16th May 2024
#
cybersecurity
#
microsoft
#
zero day malware
Microsoft's Patch Tuesday addresses 59 CVEs, including one critical and three zero-days, with notable exploits in DWM Core and MSHTML surfaces.
Img ojnrjwqfjg3qiu25nynrsuoi
Patch Tuesday has revealed 61 vulnerabilities
Wed, 15th May 2024
#
software development
#
microsoft
#
developers
Microsoft's May 2024 Patch Tuesday addresses 61 vulnerabilities, including three zero-days. Two critical RCE flaws and browser patches are also highlighted.
Img jjdptjst3gtcy7zyqrkrnzi5
Cato Networks reveals insecure protocols widespread in inaugural SASE report
Wed, 15th May 2024
#
firewalls
#
network security
#
casb
Cato Networks exposes systemic cybersecurity gaps in inaugural threat report, revealing insecure protocols employed across WAN by all examined organisations.
Img fzll5bqsvrcv0r1u85k0qqlc
ForAllSecure unveils AI-powered SBOM tool Mayhem to target real threats
Wed, 8th May 2024
#
application security
#
advanced persistent threat protection
#
supply chain
ForAllSecure reveals new AI-powered tool, Mayhem, a dynamic software bill of materials tool that proactively battles exploitable application vulnerabilities.
Img hxlmgvs503illyqpm6b2e2yw
The remote desktop tools most targeted by attackers in the last year
Thu, 2nd May 2024
#
malware
#
virtualisation
#
uc
Virtual Network Computing (VNC) was the most targeted remote desktop tool in the past year, clouds over a new Barracuda data report.
Img xhvtt4x4y8zglzjmfjv6cqjv
Azul extends Intelligence Cloud to Oracle JDK & all OpenJDK JVMs
Wed, 1st May 2024
#
devops
#
martech
#
application security
Azul broadens its Intelligence Cloud to all OpenJDK JVMs and Oracle JDK, utilising production Java data to enhance developer productivity and identify vulnerabilities.
Img n8pkoscjiud3tjdmwsxthwdb
Sevco Security drives resolution of enterprise vulnerabilities
Wed, 1st May 2024
#
it automation
#
risk & compliance
#
security vulnerabilities
Sevco Security further evolves asset protection by prioritising, automating and validating exposure issues resolution with its upgraded platform, aiding cyber risk management for businesses.
Matt malarkey  vp strategic alliances titania
Beyond the CVE: Illuminating inherent security issues in device configuration
Wed, 24th Apr 2024
#
network infrastructure
#
breach prevention
#
cybersecurity
Beyond the CVE addresses how neglecting device misconfigurations can exacerbate vulnerabilities and risk breaches, demanding constant scrutiny and remediation.
Img x5vrhfknyu3qz4niwemqbyir
BeyondTrust's 2024 report reveals top Microsoft vulnerabilities
Tue, 23rd Apr 2024
#
advanced persistent threat protection
#
microsoft
#
cloud services
BeyondTrust's 2024 Microsoft Vulnerabilities Report shows Elevation of Privilege (EoP) dominating the vulnerability class for a fourth year.
Img g2s6tz1n0wpfeih6bp1omjyo
Cado Security unmasks Cerber ransomware threat to Confluence servers
Wed, 17th Apr 2024
#
ransomware
#
encryption
#
cybersecurity
Cyber security firm, Cado Security, uncovers revelations about a Linux variant of Cerber ransomware exploiting vulnerabilities in Confluence servers using the CVE-2023-22518 exploit.
Img sj15yldvqqvh2sqv6y6bltr8
Darktrace shifts to proactive AI strategy to combat rising cyber threats
Tue, 9th Apr 2024
#
uc
#
email security
#
ai security
In response to rising AI-driven cyber threats, Darktrace is repositioning to a platform-based strategy aimed at better equipping businesses to anticipate and counter these advanced cyber attacks.
Img fzm2ld5ok79a4gl2rgnow5tp
Mandiant reveals threats to Ivanti Connect Secure appliances
Mon, 8th Apr 2024
#
edutech
#
advanced persistent threat protection
#
cybersecurity
Mandiant reveals new findings on threat actors exploiting vulnerabilities in Ivanti Connect Secure appliances, laying bare a disturbing mix of state-linked and profit-driven cyberattacks.
Img 9xtyyyezgdjbuqwy4ggxkncv
BackBox introduces major update to Network Vulnerability Manager
Fri, 29th Mar 2024
#
ransomware
#
breach prevention
#
backbox
BackBox enhances network vulnerability management with an update to its Network Vulnerability Manager, allowing organisations to mark mitigated Common Vulnerabilities and Exposures, thus refining their risk scores and optimising remediation efforts.
Img ior7anpwvu3dpm1tyba1comw
Why the external attack surface matters: An analysis into APAC-related threat activities
Fri, 22nd Mar 2024
#
ransomware
#
advanced persistent threat protection
#
cybersecurity
An analysis by Rapid7 Labs highlights the importance of the external attack surface in APAC cybersecurity, shedding light on threat activities and how regionally-targeted campaigns are utilised by ransomware actors.
Img swgbt8hk167nxx1lkvesk3du
BianLian turns to extortion after decryptor released, reveals Avast
Wed, 13th Mar 2024
#
cybersecurity
#
avast
#
threat intelligence
After Avast releases a BianLian decryptor, the hacking group resorts to extortion-only operations, exploiting vulnerabilities like TeamCity servers, reports GuidePoints.
Emily reeve kordia  1
Kordia appoints Emily Reeve as Executive General Manager of Legal & Risk
Tue, 12th Mar 2024
#
uc
#
kordia
#
orion health
Emily Reeve steps into the role of Executive General Manager - Legal and Risk at Kordia, utilising her strong legal pedigree and industry experience.
Img q4d6m7iqb5hno1nmeojgpakn
Akamai boosts App & API Protector with advanced DDoS defences
Mon, 11th Mar 2024
#
cx
#
martech
#
api
Akamai Technologies boosts security with significant upgrades to its App and API Protector, providing advanced DDoS defenses, browser impersonation detection, and improved API security.