SecurityBrief New Zealand logo
New Zealand's leading source of cybersecurity and cyber-attack news

Security vulnerabilities news stories

Story image
Vendor
Forescout reveals top vulnerabilities impacting OT vendors
Forescout’s Vedere Labs has disclosed OT: ICEFALL, naming 56 vulnerabilities affecting devices from 10 operational technology vendors.
Story image
Advent One
Advent One partners with US vulnerability management company
Advent One has partnered with New York based vulnerability management company, Vicarius to accentuate cybersecurity detection and response capabilities
Story image
Cloud
Sophos uncovers latest cyber attack trends in Playbook report
Research finds that there has been a 36% increase in cyber attack dwell time, with a median intruder dwell time of 15 days in 2021 versus 11 days in 2020.
Story image
Security vulnerabilities
New Qualys solution enables better vulnerability management
The new cloud-based solution gives insights into an organisation's risk posture along with the ability to use drag and drop workflows to orchestrate responses.
Story image
Robotic Process Automation / RPA
Micro Focus unveils Data Center Automation for SaaS delivery
MicroFocus has released Data Center Automation (DCA) for software-as-a-service (SaaS) delivery, offering more cost-effective vulnerability risk and IT compliance management.
Story image
Cloud
Armis risk management solution hones in on entire attack surface
Armis' new solution for risk-based vulnerability management enables businesses to prioritise mitigation efforts across the entire asset attack surface.
Story image
Microsoft
Elevation of Privilege the top 2021 Microsoft vulnerability
BeyondTrust has released its 2022 Microsoft Vulnerabilities Report, finding that Elevation of Privilege is the top vulnerability category for the second consecutive year.
Story image
New Relic
New Relic launches vulnerability management platform
New Relic has introduced New Relic Vulnerability Management to help organisations find and address security risks faster and with greater precision.
Story image
Malware
New vulnerabilities found in Nuspire’s Q1 2022 Threat Report
“Threat actors are quickly adjusting their tactics and these exploits tend to get industry attention, but the threat posed by older and attacks still persists."
Story image
Cloud
Qualys updates Cloud Platform solution with rapid remediation
The new update is designed to enable organisations to fix asset misconfigurations, patch OS and third-party applications, and deploy custom software.
Story image
Remote Working
How zero trust and SD-WANs can support productive remote working
The way people connect with applications and data has changed, users are remotely accessing resources that could be stored anywhere from a corporate data center to the cloud.
Story image
Phishing
Developments in phishing and how to protect your business
Phishing, the practice of sending malicious emails to encourage users to perform actions that benefit an attacker, is a key security concern for modern businesses due to its prevalence and impact.
Story image
Cybersecurity
NCSC, international partners issue cyber security advisory
The National Cyber Security Centre (NCSC) has issued a cyber security advisory in collaboration with its international partners detailing common vulnerabilities and exposures.
Story image
Healthcare
Attacks on critical infrastructure continue - Trellix report
“We’re at a critical juncture in cybersecurity and observing increasingly hostile behaviour across an ever-expanding attack surface."
Story image
Digital Transformation
Vulnerabilities on the rise - public sector at risk
New Invicti Research has found that vulnerabilities are rising, and that government and education sectors are particularly at risk.
Story image
Cybersecurity
Widespread threats increase by 38% in 2021 - Rapid7 report
Rapid7 has released its latest Vulnerability Intelligence Report detailing the most significant security vulnerabilities and cyber attacks in 2021.
Story image
Cybersecurity
Four ways to secure cloud workloads and your crown jewels
Organisations need to understand what makes cloud workloads so vulnerable, how attacks play out and why adopting runtime protection is the best practice approach.
Story image
Inventory
The patch management challenge
We all know that patching is important, so why is the physical process for updating systems across the enterprise still so difficult?
Story image
Cybersecurity
New report shows increase of ICS vulnerabilities in critical infrastructure
The amount of Industrial Control System (ICS) vulnerabilities in critical infrastructure sectors have been found to have increased by 110% over the last four years, according to a new report by Claroty.
Story image
Ransomware
Five cyber threat trends and what they mean to your business
The recent Russia-Ukraine crisis has unearthed the worrying possibilities of widespread cybersecurity threats, further highlighting the importance of the role threat intelligence plays in protecting infrastructure.
Story image
Cybersecurity
Kaspersky uncovers multiple vulnerabilities in wearable tracking technology
Kaspersky's researchers have found 33 vulnerabilities in the most commonly used protocol for transferring data from wearable devices worn by patients for remote monitoring.
Story image
Software
Qualys adds advanced remediation capabilities to Cloud Platform
The new update enables organisations to fix asset misconfigurations, patch OS and third-party applications, and deploy custom software.
Story image
Mandiant
Nucleus Security teams up with Mandiant to enhance vulnerability management programs with threat intelligence
Nucleus Security has entered into a strategic partnership with Mandiant, the leader in dynamic cyber defense and response.
Story image
DevOps
Container adoption approaching maturity at expense of security best practices
More than 75% of running containers have vulnerabilities, partly as a result of ignoring security and operational best practices.