Security vulnerabilities stories

Exclusive: Qualys' risk-based approach to cybersecurity
Yesterday
#
cybersecurity
#
security vulnerabilities
#
qualys
Qualys, a provider of cloud-based security and compliance solutions, has been pivotal in aiding companies through their digital transformation.

UK employees jeopardise workplace cybersecurity with unauthorised downloads
This month
#
cybersecurity
#
compliance
#
risk
Two-thirds of UK employees are endangering business cybersecurity by unauthorised app downloads, often unbeknown to IT departments, Armis research reveals.

Cloud native security threats concern 75% of IT & security leaders
This month
#
cybersecurity
#
devops
#
it
New research shows that IT and security leaders believe Kubernetes will play a major role in app development, but are concerned about security.

GitHub's AI revolution: Transforming code language & developer experience
This month
#
open source
#
github
#
security vulnerabilities
GitHub announces an AI-driven platform that integrates AI into every phase of development, introducing natural language as a universal programming language.

Updating Apple devices in the era of rapid security responses
This month
#
byod
#
siem
#
apple
Every organisation employing Apple devices must develop and follow a clear strategy to handle Apple’s new RSR approach to OS upgrades.

In today’s data-driven world, compromising on cybersecurity is not an option
This month
#
cybersecurity
#
fintech
#
threat intelligence
As the global financial ecosystem expands, it's getting harder for organisations to navigate the maze of cyber risks alone.

BeyondTrust experts forecast key cybersecurity threats for 2024
This month
#
voip
#
malware
#
cybersecurity
BeyondTrust’s cybersecurity experts predict the main global threats for 2024, including advanced AI threats and a rise in subscription-based model risks.

Winter Vivern exploits webmail server vulnerability targets European governments
Last month
#
surveillance
#
cybersecurity
#
security vulnerabilities
Winter Vivern cyber group targets European governments using XSS vulnerability of Roundcube Webmail server, as ESET researchers have discovered.

Generative AI: A disruptive force at the hands of cyber attackers
Last month
#
phishing
#
cybersecurity
#
ai
Generative AI tools in the wrong hands are a serious threat, which is why their use must be regulated properly.

The IT industry is stalling on SBOMs when it should be working on best practice
Last month
#
open source
#
security vulnerabilities
#
it industry
SBOMs will be key to dealing with the next big vulnerability and incredibly useful in the fight to minimise the effects of smaller weaknesses.

Microsoft research highlights vulnerabilities in ChatGPT models
Last month
#
cybersecurity
#
ai
#
security vulnerabilities
Researchers have discovered vulnerabilities in the trustworthiness of GPT models, raising concerns about toxic and biased outputs.

Zyxel Networks launches game-changing WiFi 7 access point for business use
Last month
#
wifi
#
security vulnerabilities
#
zyxel
Zyxel Networks unveils its first WiFi 7 access point, promising to revolutionise high-density business connectivity.

Vitrana reduces software security vulnerabilities by 66% using CAST
Last month
#
cybersecurity
#
security vulnerabilities
#
threat detection
Global platform provider Vitrana leverages CAST technology to slash its software security vulnerabilities by 66%.

Organisations fail to see benefit of ethical hacking - report
Last month
#
cybersecurity
#
hackers
#
risk
52% of security professionals prefer to accept undiscovered vulnerabilities than work with hackers, HackerOne data shows.

Hackuity launches Version 2.0 of next gen vulnerability management
Last month
#
attack
#
risk
#
threat intelligence
Hackuity, the risk-based vulnerability management provider, has launched Version 2.0 of its platform with major enhancements to support risk prioritisation.

Ordr announces integration with ServiceNow vulnerability response
Last month
#
iot security
#
iot
#
partner programmes
Joint solution closes visibility gaps, optimizing vulnerability management for all managed and unmanaged devices, including IoT, IoMT and OT.

Interactive announces partnership with CrowdStrike
Last month
#
cybersecurity
#
xdr
#
security vulnerabilities
The partnership expands Interactive's cybersecurity offering and strengthens its position as a leader in the technology industry.

78% of organisations under-report cyberattacks: ISACA
Last month
#
cloud services
#
cybersecurity
#
skills shortage
Interestingly, only 42% of respondents in Oceania say their organisation conducts a cyber-risk assessment at least annually, compared to 43% in 2022.

Severe 'Looney Tunables' security flaw found in some Linux editions
Last month
#
cybersecurity
#
linux
#
security vulnerabilities
Major security flaw, 'Looney Tunables', detected in glibc, threatens Linux distributions, urgent patch recommended.

Keysight and Synopsys partner for IoT device cybersecurity
Fri, 29th Sep 2023
#
iot security
#
cybersecurity
#
iot
Synopsys Defensics fuzz testing software is now embedded into Keysight’s IoT Security Assessment solution, which reduces costs while speeding up time-to-market.

GOLD MELODY acts as initial access broker, says Secureworks report
Tue, 26th Sep 2023
#
cybersecurity
#
secureworks
#
security vulnerabilities
GOLD MELODY identified as cyber threat group selling access to compromised organisations to other criminals. Active since 2017.

No dedicated hardware security for 66% IoT modules: IoT Analytics
Fri, 22nd Sep 2023
#
iot security
#
bi
#
iot
The report reveals that 29% of IoT modules had no security features, exposing them to potential risks and vulnerabilities.

Data security gap threatens collaboration in Europe: IDC
Wed, 20th Sep 2023
#
hybrid cloud
#
gdpr
#
multi-cloud
IDC research reveals 1 in 4 European organisations report data security as their biggest obstacle in sharing data and collaborating within their organisation.

Recorded Future discloses new high-risk vulnerabilities
Tue, 19th Sep 2023
#
microsoft
#
risk
#
zero day malware
Recorded Future's monthly report reveals high-risk vulnerabilities, exploit chains, and zero-day vulnerabilities affecting Microsoft and Ivanti products.