Common Vulnerabilities and Exposures (CVE) stories - Page 7
Mandiant reveals threats to Ivanti Connect Secure appliances
Mon, 8th Apr 2024
#
edutech
#
advanced persistent threat protection
#
cybersecurity
Mandiant reveals new findings on threat actors exploiting vulnerabilities in Ivanti Connect Secure appliances, laying bare a disturbing mix of state-linked and profit-driven cyberattacks.
BackBox introduces major update to Network Vulnerability Manager
Fri, 29th Mar 2024
#
ransomware
#
breach prevention
#
backbox
BackBox enhances network vulnerability management with an update to its Network Vulnerability Manager, allowing organisations to mark mitigated Common Vulnerabilities and Exposures, thus refining their risk scores and optimising remediation efforts.
Why the external attack surface matters: An analysis into APAC-related threat activities
Fri, 22nd Mar 2024
#
ransomware
#
advanced persistent threat protection
#
cybersecurity
An analysis by Rapid7 Labs highlights the importance of the external attack surface in APAC cybersecurity, shedding light on threat activities and how regionally-targeted campaigns are utilised by ransomware actors.
BianLian turns to extortion after decryptor released, reveals Avast
Wed, 13th Mar 2024
#
cybersecurity
#
avast
#
threat intelligence
After Avast releases a BianLian decryptor, the hacking group resorts to extortion-only operations, exploiting vulnerabilities like TeamCity servers, reports GuidePoints.
Akamai boosts App & API Protector with advanced DDoS defences
Mon, 11th Mar 2024
#
cx
#
martech
#
api
Akamai Technologies boosts security with significant upgrades to its App and API Protector, providing advanced DDoS defenses, browser impersonation detection, and improved API security.
Akamai enhances API Protector with anti-DDoS & bot detection
Tue, 5th Mar 2024
#
ddos
#
application security
#
ai
Akamai Technologies bolsters App and API Protector with precise DDoS attack mitigation, URL Protection and Browser Impersonation Detection.
Coalition predicts 25% surge in cyber vulnerabilities for 2024
Mon, 26th Feb 2024
#
ransomware
#
advanced persistent threat protection
#
risk & compliance
Cyber-insurance provider, Coalition, forecasts a 25% increase in cyber vulnerabilities in 2024, in its just released Cyber Threat Index, warning businesses to prepare for an escalating digital risk landscape.
Trustwave reveals cybersecurity threats targeting education sector
Fri, 23rd Feb 2024
#
edutech
#
data privacy
#
higher education
Cybersecurity firm Trustwave has revealed unique threats facing the education sector in their latest analysis, 2024 Education Threat Landscape, offering key strategies for building cybersecurity resilience.
Hackuity achieves SOC 2 Type II compliance for data security
Wed, 21st Feb 2024
#
risk & compliance
#
security vulnerabilities
#
data security
Hackuity, the RBVM company, attains SOC 2 Type II compliance, showcasing strong data security and compliance that uphold rigorous American standards, providing customers with enterprise-grade security assurance.
Trend Micro uncovers Water Hydra's Windows Defender exploit
Thu, 15th Feb 2024
#
ransomware
#
edr
#
cybersecurity
Trend Micro discloses critical zero-day vulnerability in Windows Defender, under malicious exploitation by cyber-threat group, Water Hydra, endangering millions of users globally.
Rising threats to operational tech & IoT networks, warns Nozomi
Tue, 13th Feb 2024
#
firewalls
#
network security
#
iot security
Network case anomalies surge 19%, marking a rising and sophisticated threat to operational technology and IoT environments, with manufacturing vulnerabilities rocketing 230%, warns Nozomi Networks Labs.
Milestone Systems teams up with CVE Program for cybersecurity
Wed, 7th Feb 2024
#
digital entertainment
#
video
#
transparency
Video technology leader, Milestone Systems, partners with the Common Vulnerability and Exposures Program, furthering transparency and cooperation in addressing cybersecurity threats.
2024 cybersecurity trends: AI, cloud and threat intelligence
Tue, 23rd Jan 2024
#
cloud security
#
application security
#
supply chain
We see 2024 shaping up to be the defining moment where AI may become the profound battleground in cybersecurity.
Cyber attacks double, utilities & manufacturing hardest hit
Tue, 23rd Jan 2024
#
advanced persistent threat protection
#
cybersecurity
#
cto
Armis's report shows cyber attacks globally doubled in 2023, with utilities and manufacturing sectors the hardest hit.
Less than 1% vulnerabilities pose highest risk in 2023, finds Qualys
Thu, 18th Jan 2024
#
malware
#
ransomware
#
advanced persistent threat protection
Less than 1% of security vulnerabilities created the highest risks to businesses in 2023, with 97 high-risk vulnerabilities exploited undetected, says Qualys Threat Research Unit report.
Ivanti VPN vulnerabilities exploited by suspected espionage group UNC5221
Mon, 15th Jan 2024
#
malware
#
vpns
#
advanced persistent threat protection
Suspected espionage group UNC5221 exploited two zero-day vulnerabilities in Ivanti VPN and security appliances, using multiple custom malware families for post-exploitation espionage.
Software security strains under supply chain complexity, Slim.AI reveals
Fri, 5th Jan 2024
#
supply chain
#
ai
#
cybersecurity
Over 40% of firms struggle to tackle vulnerabilities in the rising complexity of software supply chains, despite sizeable resource allocation, says Slim.AI's recent Container Report.
Kaspersky discovers dual-threat NKAbuse malware in Latin America and Vietnam
Fri, 5th Jan 2024
#
malware
#
ddos
#
semiconductors
Cybersecurity firm Kaspersky uncovers a new potent malware, NKAbuse, exploiting the NKN technology to launch twin threats as a flooder and a backdoor/RAT, with victims emerging in Colombia, Mexico, and Vietnam.
Operation Triangulation: Undocumented iPhone hardware feature exposed
Thu, 28th Dec 2023
#
devops
#
apm
#
software development
Kaspersky's GReAT team has uncovered an undisclosed iPhone hardware feature used in Operation Triangulation attacks.
Beware the lasting legacy of the Log4j vulnerability
Mon, 18th Dec 2023
#
application security
#
open source
#
software development
Efforts to mitigate the Log4j vulnerability involve updating to patched versions of Log4j, but the process continues to be complex.