SecurityBrief Asia - Technology news for CISOs & cybersecurity decision-makers

Security vulnerabilities stories

Story image
Secureworks launches its Taegis security posture dashboard
2 days ago
#
cybersecurity
#
security vulnerabilities
#
secureworks
Secureworks reduce cyber risk and bolster cyber resiliency with the new dashboard, which companies can use to evaluate and strengthen their security posture.
Story image
1,292 Microsoft vulnerabilities in 2022, according to report
3 days ago
#
microsoft
#
endpoint protection
#
cybersecurity
BeyondTrust has released its 2023 Microsoft Vulnerabilities Report, finding vulnerabilities rose to 1,292 in 2022, an all-time high in the report’s 10-year history.
Story image
Claroty and ServiceNow bring greater security to cyber-physical systems
4 days ago
#
servicenow
#
security vulnerabilities
#
claroty
“Together, Claroty and ServiceNow help enterprises rapidly and comprehensively discover the assets they own, which in turn enables them to assess and quickly address asset vulnerabilities."
Story image
Jumpsec reports a 17% increase in ransomware across the UK
5 days ago
#
cybersecurity insurance
#
ransomware
#
cybersecurity
The reported ransomware incidents increased by 17% in the UK last year, with LockBit dominating the ransomware attack landscape, in the UK and worldwide.
Story image
Cloud visibility and port spoofing: The known unknown
5 days ago
#
private cloud
#
network security
#
operating systems
Traffic logging just happens to be the use case that has endured. However, this reliance on established methods has left some vulnerabilities in network and port spoofing.
Story image
Potential cheating vulnerabilities in Chess.com: Check Point
5 days ago
#
security vulnerabilities
#
online gaming
#
online games
Check Point Research identified security vulnerabilities in Chess.com, which, left unpatched, can be used to cheat and solve games without playing.
Story image
Check Point finds potential cybercrime scenarios in ChatGPT4
5 days ago
#
malware
#
phishing
#
cybersecurity
Check Point analysed ChatGPT4 and released five scenarios that threat actors can exploit to streamline malicious efforts faster and more precisely.
Story image
Claroty uncovers vulnerabilities in Akuvox intercom system
Last week
#
data protection
#
cybersecurity
#
iot
Claroty has uncovered 13 vulnerabilities in the Akuvox E11 smart intercom system, making the camera and microphone vulnerable and compromising video and images.
Story image
Imperva uncovers vulnerabilities in NFT marketplace OpenSea
Last week
#
phishing
#
cybersecurity
#
open source
Imperva threat team has uncovered recently that NFT marketplace OpenSea is affected by a vulnerability that reveals users' identities.
Story image
Public sector IT teams must adopt a new approach to app security
This month
#
application security
#
devsecops
#
it industry
Technologists are struggling to manage soaring volumes of emerging cyber threats across an increasingly dynamic and fragmented IT environment.
Story image
How to get cyber insurance – what mid-sized organisations need to know
This month
#
cybersecurity insurance
#
cybersecurity
#
mfa
Cyber insurance is not a silver bullet to all these woes, but it does provide a significant safety net to organisations that have already achieved a basic level of cyber resilience.
Story image
Attackers deploying exploits faster than ever, finds Rapid7
This month
#
cybersecurity
#
it solutions
#
security vulnerabilities
Rapid7 Vulnerability Intelligence Report finds attackers developing and deploying exploits faster, with an 87% increase in first-week exploitation since 2020.
Story image
High-profile data leaks in Australia add a new level of urgency to cybersecurity protections
Last month
#
phishing
#
cybersecurity
#
data leak
Given that most large organisations have made significant cybersecurity investments yet have poorly resourced security teams under enormous stress, what can be done to reduce the likelihood of incidents occurring?
Story image
The bad password advice you need to leave behind in 2023
Last month
#
cybersecurity
#
passwords
#
enterprise security
For companies to better meet cybersecurity standards, it's time to throw away the bad password advice and take steps to eliminate passwords once and for all.
Story image
Cyber vulnerabilities found by internal research teams up 80%
Last month
#
iot
#
security vulnerabilities
#
research
"Vendors are embracing the need to secure cyber-physical systems by dedicating time, people, and money to not only patching software and firmware vulnerabilities, but also to product security teams."
Story image
Sysdig reveals 87% of Container Images have vulnerabilities
Last month
#
cloud security
#
security vulnerabilities
#
containers
The report looks at real-world data to understand how global companies and industries use and secure cloud and container environments.
Story image
Will 2023 be a pivot year for cybersecurity?
Last month
#
cybersecurity
#
skills shortage
#
security vulnerabilities
In the past, mega vulnerabilities happened once a quarter, but this past year we've been dealing with critical vulnerabilities almost weekly in some cases.
Story image
Service meshes are an emerging way for application teams to implement Zero Trust
Last month
#
cybersecurity
#
security vulnerabilities
#
cyber threats
The challenge for organisations is that even with a secure perimeter, internal systems and data can be compromised if a malicious actor gets in or another internal system has a vulnerability.
Story image
China-based threat group targeting public cloud - Radware
Fri, 20th Jan 2023
#
ransomware
#
public cloud
#
malware
Radware has issued a threat advisory about a for-profit threat group from China known as the 8220 Gang, who has emerged in the New Year targeting public cloud environments.
Story image
Trustwave provides new feature for threat hunting platform
Thu, 19th Jan 2023
#
cybersecurity
#
trustwave
#
security vulnerabilities
Trustwave has relaunched its Advanced Continual Threat Hunting platform with a unique feature allowing its SpiderLabs threat hunting teams to carry out many more human-led threat hunts.
Story image
Claroty’s Team82 finds vulnerabilities in historian server
Thu, 19th Jan 2023
#
cybersecurity
#
security vulnerabilities
#
data breach
Claroty's research team, Team82, has examined the GE Proficy Historian, finding five exploitable vulnerabilities capable of causing damage to the system.
Story image
Data breach in 2023 to exceed US$5 million/incident: Acronis
Thu, 29th Dec 2022
#
ransomware
#
phishing
#
cybersecurity
Between July and October, Acronis found that the proportion of phishing attacks has risen by 1.3, accounting for 76% of all attacks.
Story image
GreyNoise Intelligence identifies exploitation threats for 2023
Fri, 23rd Dec 2022
#
cybersecurity
#
internet
#
business analyst
“When it comes to cybersecurity, not all vulnerabilities are created equal, and many of the ones that garner media attention actually turn out to be insignificant."
Story image
Iran-sponsored group using GitHub to deploy custom malware
Tue, 13th Dec 2022
#
secureworks
#
security vulnerabilities
#
github
The Secureworks Counter Threat Unit (CTU) has uncovered a subgroup of Iranian Cobalt Mirage using GitHub to store and deploy malware.
© 2023 Techday, All rights reserved. Hosted on Plan B's Cloud Services. DMARC protection by PowerDMARC.