SecurityBrief Asia - Technology news for CISOs & cybersecurity decision-makers

Security vulnerabilities stories - Page 4

Story image
Organisations fail to see benefit of ethical hacking - report
Fri, 13th Oct 2023
#
compliance
#
cybersecurity
#
risk intelligence & compliance
52% of security professionals prefer to accept undiscovered vulnerabilities than work with hackers, HackerOne data shows.
Story image
Hackuity launches Version 2.0 of next gen vulnerability management
Fri, 13th Oct 2023
#
web development
#
compliance
#
development
Hackuity, the risk-based vulnerability management provider, has launched Version 2.0 of its platform with major enhancements to support risk prioritisation.
Story image
Ordr announces integration with ServiceNow vulnerability response
Fri, 6th Oct 2023
#
iot security
#
iot
#
partner programmes
Joint solution closes visibility gaps, optimizing vulnerability management for all managed and unmanaged devices, including IoT, IoMT and OT.
Story image
Interactive announces partnership with CrowdStrike
Fri, 6th Oct 2023
#
partner programmes
#
ai security
#
xdr
The partnership expands Interactive's cybersecurity offering and strengthens its position as a leader in the technology industry.
Story image
78% of organisations under-report cyberattacks: ISACA
Fri, 6th Oct 2023
#
cloud services
#
compliance
#
cybersecurity
Interestingly, only 42% of respondents in Oceania say their organisation conducts a cyber-risk assessment at least annually, compared to 43% in 2022.
Story image
Severe 'Looney Tunables' security flaw found in some Linux editions
Wed, 4th Oct 2023
#
cybersecurity
#
linux
#
security vulnerabilities
Major security flaw, 'Looney Tunables', detected in glibc, threatens Linux distributions, urgent patch recommended.
Story image
Keysight and Synopsys partner for IoT device cybersecurity
Fri, 29th Sep 2023
#
iot security
#
iot
#
cybersecurity
Synopsys Defensics fuzz testing software is now embedded into Keysight’s IoT Security Assessment solution, which reduces costs while speeding up time-to-market.
Story image
GOLD MELODY acts as initial access broker, says Secureworks report
Tue, 26th Sep 2023
#
cybersecurity
#
secureworks
#
security vulnerabilities
GOLD MELODY identified as cyber threat group selling access to compromised organisations to other criminals. Active since 2017.
Story image
No dedicated hardware security for 66% IoT modules: IoT Analytics
Fri, 22nd Sep 2023
#
big data
#
iot security
#
bi
The report reveals that 29% of IoT modules had no security features, exposing them to potential risks and vulnerabilities.
Story image
Data security gap threatens collaboration in Europe: IDC
Wed, 20th Sep 2023
#
hybrid cloud
#
gdpr
#
multi-cloud
IDC research reveals 1 in 4 European organisations report data security as their biggest obstacle in sharing data and collaborating within their organisation.
Story image
Recorded Future discloses new high-risk vulnerabilities
Tue, 19th Sep 2023
#
microsoft
#
compliance
#
security vulnerabilities
Recorded Future's monthly report reveals high-risk vulnerabilities, exploit chains, and zero-day vulnerabilities affecting Microsoft and Ivanti products.
Story image
Australia is 5th most hacked worldwide, says cybersecurity expert
Wed, 13th Sep 2023
#
data protection
#
phishing
#
email security
According to the expert, cybercriminals are prospecting for valuable information, exploiting vulnerabilities and forging new techniques.
Story image
Two in three companies lose data due to no backups: Apricorn
Fri, 8th Sep 2023
#
data protection
#
dr
#
cloud services
Nearly one-third of security leaders admit to insufficiently robust backup processes manual, and local backups rise.
Story image
Sophos announces Incident Response Retainer for 24/7 support
Thu, 31st Aug 2023
#
firewall
#
network security
#
breach prevention
Sophos has launched its Sophos Incident Response Retainer, offering organisations speedy access to its fixed-cost incident response service.
Story image
Cost of data breach in Australia has grown 32% in 5 years: IBM
Thu, 31st Aug 2023
#
breach prevention
#
cybersecurity
#
security vulnerabilities
The average cost of a data breach in Australia has grown 32% in the last five years, reaching AU$4.03 million per the 2023 Cost of a Data Breach Report.
Story image
Majority APAC health providers facing cyber incidents: Claroty
Thu, 31st Aug 2023
#
ransomware
#
it in healthcare
#
compliance
Claroty’s Global Healthcare Cybersecurity Study 2023 reveals priorities and challenges amid escalating cyber-physical connectivity.
Story image
NCC Group reveals Cl0p ransomware attack continues to dominate
Wed, 23rd Aug 2023
#
ransomware
#
advanced persistent threat protection
#
security vulnerabilities
The findings mark a 154% increase year-on-year (198 attacks in July 2022), and a 16% rise on the previous month (434 attacks in June 2023).
Story image
New security vulnerabilities exploited en masse in 2023 - Rapid7
Wed, 23rd Aug 2023
#
big data
#
ransomware
#
bi
Rapid7 released its 2023 Mid-Year Threat Review, which provides a detailed snapshot of the attack landscape in the first six months of this year.
Story image
New SecurityGen study highlights hidden threat to 5G networks
Fri, 18th Aug 2023
#
ddos
#
firewall
#
breach prevention
Telecom security experts call on operators to implement comprehensive cyber-security measures against GTP threats.
Story image
MongoDB announces general availability of encryption technology
Thu, 17th Aug 2023
#
cloud services
#
encryption
#
cybersecurity
MongoDB has unveiled MongoDB Queryable Encryption, a technology that safeguards sensitive data when it is queried and used on the platform.
Story image
Qualys unveils first-party software risk management solution
Fri, 4th Aug 2023
#
digital transformation
#
compliance
#
cybersecurity
The new solution aids security teams to detect, prioritise and remediate vulnerabilities within company-developed software and embedded open-source components.
Story image
CyFox identifies critical hijacking vulnerability in popular streaming software
Thu, 3rd Aug 2023
#
video
#
physical security
#
security vulnerabilities
Critical hijacking vulnerability in Stremio 4.4 puts 5 million users at risk; remote code execution and information theft possible.
Story image
How to understand IDOR vulnerabilities for your protection
Thu, 3rd Aug 2023
#
cybersecurity
#
cequence
#
advisor
Once a customer is aware of the endpoints they have, instrumenting them for security posture becomes the next priority.
Story image
Cohesity reveals companies’ cyber resilience deficiencies
Fri, 28th Jul 2023
#
ransomware
#
advanced persistent threat protection
#
cybersecurity
According to the research, 78% of respondents say their company will pay a ransom to recover data and restore business processes.