Exploits stories
![Story image](../../../../../uploads/story/2024/12/11/preview_techday_d1935e86bfc527e2a477.webp)
Tenable unveils autonomous solution for patch management
Wed, 11th Dec 2024
#
cloud security
#
it automation
#
risk & compliance
Tenable has launched Tenable Patch Management, an autonomous solution designed to streamline vulnerability remediation amid increasing cyber threats.
![Story image](../../../../../uploads/story/2024/09/11/preview_techday_ca43607724538ffb20aa.webp)
Opus security unveils advanced AI-driven vulnerability engine
Wed, 11th Sep 2024
#
risk & compliance
#
ai
#
collaboration
Opus Security unveils its AI-powered Advanced Multi-Layered Prioritization Engine, revolutionising how organisations manage and address vulnerabilities.
![Story image](../../../../../uploads/story/2024/06/03/preview_img-0mpQHBDv8iu6WM2DOUrVCEjd.webp)
RedTail cryptomining malware exploits new Palo Alto flaw
Mon, 3rd Jun 2024
#
cryptocurrency
#
blockchain
#
cybersecurity
Hackers exploiting newly found vulnerability in Palo Alto’s PAN-OS are using RedTail malware to enhance cryptomining operations, raising cybersecurity alarms.
![Story image](../../../../../uploads/story/2024/05/22/preview_img-Z4tUP2B9PNSX6cTfVDib5g85.webp)
Rapid7's 2024 report reveals surge in zero-day exploits
Wed, 22nd May 2024
#
mfa
#
advanced persistent threat protection
#
exploits
Rapid7’s 2024 Attack Intelligence Report highlights a sharp rise in zero-day vulnerabilities causing mass breaches and underscores the necessity for faster patching and robust MFA protocols.
![Story image](../../../../../uploads/story/2024/04/02/preview_img-VhX2XwFIlL4zYgjDDx6IpdJf.webp)
Record rise in zero-day vulnerabilities exposed in Google-Mandiant report
Tue, 2nd Apr 2024
#
smartphones
#
advanced persistent threat protection
#
personal computing devices
Google and Mandiant's cybersecurity report reveals a 50% rise in exploited zero-day vulnerabilities in 2023, with China being the leading perpetrator.
![Story image](../../../../../uploads/story/2024/03/14/preview_img-eYH2OrKEquvfPAgHFPDaK9gu.webp)
New Relic releases interactive security testing with proof-of-exploit reports
Thu, 14th Mar 2024
#
application security
#
devsecops
#
apm
New Relic's observability platform now offers Interactive Application Security Testing (IAST) with a proof-of-exploit reporting feature, enabling real-time identification and fixing of application vulnerabilities before code deployment.
![Story image](../../../../../uploads/story/2024/02/16/preview_img-ixdCT8WibXO7OntxIKl9CVkl.webp)
Cybersecurity is your defensive strategy, cyber resilience is your business
Fri, 16th Feb 2024
#
ransomware
#
cybersecurity
#
disruption
In light of the massive cybersecurity breach impacting Ivanti solutions, firms are urged to embrace cyber resilience for business continuity, demonstrating greater fortitude against potential disruptions.
![Story image](../../../../../uploads/story/2023/12/28/preview_img-Uzy3KGezDQtAEjDyDFruMtjN.webp)
Data Theorem sweeps 2023 CyberSecured Awards with cloud & mobile protections
Thu, 28th Dec 2023
#
application security
#
multi-cloud
#
cybersecurity
Data Theorem's Cloud Secure and Mobile Protect acclaimed for top cloud security and mobile API threat protection at 2023 CyberSecured Awards.
![Story image](../../../../../uploads/story/2023/10/25/preview_java.webp)
First Azul State of Java survey reveals Java's crucial role in tech industry
Wed, 25th Oct 2023
#
private cloud
#
hybrid cloud
#
public cloud
Azul's inaugural State of Java survey highlights Java's vital role in global tech, with 98% of firms reporting usage.
![Story image](../../../../../uploads/story/2023/10/18/preview_Ameya_Talwalkar_landscape.webp)
Cequence brings API protection to HPE GreenLake Marketplace
Wed, 18th Oct 2023
#
risk & compliance
#
hpe
#
fraud
Cequence Security offers first-ever API protection on the HPE GreenLake Marketplace, promoting visibility, reduced costs, and minimised business risks.
![Story image](../../../../../uploads/story/2023/10/13/preview_GettyImages-817486068.webp)
Telegram, AWS, and Alibaba Cloud targeted in latest supply chain attack
Fri, 13th Oct 2023
#
hyperscale
#
public cloud
#
supply chain & logistics
An attacker attempted to exploit the open-source community by uploading a series of malicious packages to the PyPi package manager.
![Story image](../../../../../uploads/story/2023/09/19/preview_GettyImages-1333874392.webp)
Recorded Future discloses new high-risk vulnerabilities
Tue, 19th Sep 2023
#
risk & compliance
#
microsoft
#
zero day malware
Recorded Future's monthly report reveals high-risk vulnerabilities, exploit chains, and zero-day vulnerabilities affecting Microsoft and Ivanti products.
![Story image](../../../../../uploads/story/2023/08/03/preview_GettyImages-1491848386.webp)
CyFox identifies critical hijacking vulnerability in popular streaming software
Thu, 3rd Aug 2023
#
physical security
#
digital entertainment
#
software development
Critical hijacking vulnerability in Stremio 4.4 puts 5 million users at risk; remote code execution and information theft possible.
![Story image](../../../../../uploads/story/2023/05/19/preview_GettyImages-915347404.webp)
Claroty reveals five vulnerabilities in NETGEAR RAX30 routers
Fri, 19th May 2023
#
iot
#
cybersecurity
#
healthtech
Claroty’s research arm, Team82, has disclosed five vulnerabilities in NETGEAR’s RAX30 routers they discovered at the Pwn2Own Toronto hacking competition.
![Story image](../../../../../uploads/story/2023/03/01/preview_GettyImages-1369792495.webp)
Attackers deploying exploits faster than ever, finds Rapid7
Wed, 1st Mar 2023
#
risk & compliance
#
cybersecurity
#
security vulnerabilities
Rapid7 Vulnerability Intelligence Report finds attackers developing and deploying exploits faster, with an 87% increase in first-week exploitation since 2020.
![Story image](../../../../../uploads/story/2023/02/01/preview_GettyImages-1354326423.webp)
Secureworks finds Iranian threat group back with new persona
Wed, 1st Feb 2023
#
advanced persistent threat protection
#
disruption
#
data leak
Secureworks has found that the Iranian threat group, Cobalt Sapling, has reemerged with a new persona, Abraham's Ax.
![Story image](../../../../../uploads/story/2023/01/19/preview_GettyImages-1355804078.webp)
Claroty’s Team82 finds vulnerabilities in historian server
Thu, 19th Jan 2023
#
breach prevention
#
cybersecurity
#
data breach
Claroty's research team, Team82, has examined the GE Proficy Historian, finding five exploitable vulnerabilities capable of causing damage to the system.
![Story image](../../../../../uploads/story/2022/12/23/preview_GettyImages-497953315.webp)
GreyNoise Intelligence identifies exploitation threats for 2023
Fri, 23rd Dec 2022
#
uc
#
advanced persistent threat protection
#
cybersecurity
GreyNoise Intelligence unveils its 2022 Mass Exploitation Report, delving deep into threat detection events from the past year.
![Story image](../../../../../uploads/story/2022/12/01/preview_GettyImages-1156955640.webp)
Lookout finds predatory behaviour on 300 loan apps
Thu, 1st Dec 2022
#
application security
#
email security
#
casb
Almost 300 loan apps found in Africa, Southeast Asia, India, Colombia, and Mexico exhibit predatory behavior, says Lookout.
![Story image](../../../../../uploads/story/2022/10/20/preview_GettyImages-1208740747.webp)
Attackers use automation to increase speed from exploits
Thu, 20th Oct 2022
#
cloud security
#
exploits
#
automation
Attackers are advancing to keep pace with cloud adoption and response time, according to a new report from Lacework.