TelcoNews India - Telecommunications news for ICT decision-makers

Common Vulnerabilities and Exposures (CVE) stories - Page 7

Img 9xtyyyezgdjbuqwy4ggxkncv

BackBox introduces major update to Network Vulnerability Manager

Fri, 29th Mar 2024
#
ransomware
#
breach prevention
#
backbox
BackBox enhances network vulnerability management with an update to its Network Vulnerability Manager, allowing organisations to mark mitigated Common Vulnerabilities and Exposures, thus refining their risk scores and optimising remediation efforts.
Img ior7anpwvu3dpm1tyba1comw

Why the external attack surface matters: An analysis into APAC-related threat activities

Fri, 22nd Mar 2024
#
ransomware
#
advanced persistent threat protection
#
cybersecurity
An analysis by Rapid7 Labs highlights the importance of the external attack surface in APAC cybersecurity, shedding light on threat activities and how regionally-targeted campaigns are utilised by ransomware actors.
Img swgbt8hk167nxx1lkvesk3du

BianLian turns to extortion after decryptor released, reveals Avast

Wed, 13th Mar 2024
#
cybersecurity
#
avast
#
threat intelligence
After Avast releases a BianLian decryptor, the hacking group resorts to extortion-only operations, exploiting vulnerabilities like TeamCity servers, reports GuidePoints.
Img q4d6m7iqb5hno1nmeojgpakn

Akamai boosts App & API Protector with advanced DDoS defences

Mon, 11th Mar 2024
#
cx
#
martech
#
api
Akamai Technologies boosts security with significant upgrades to its App and API Protector, providing advanced DDoS defenses, browser impersonation detection, and improved API security.
Img 5gjliexnhfdc3uukimaoiah3

Akamai enhances API Protector with anti-DDoS & bot detection

Tue, 5th Mar 2024
#
ddos
#
application security
#
ai
Akamai Technologies bolsters App and API Protector with precise DDoS attack mitigation, URL Protection and Browser Impersonation Detection.
Img 8hxgpmb8uyn3xmfy3g664koo

Coalition predicts 25% surge in cyber vulnerabilities for 2024

Mon, 26th Feb 2024
#
ransomware
#
advanced persistent threat protection
#
risk & compliance
Cyber-insurance provider, Coalition, forecasts a 25% increase in cyber vulnerabilities in 2024, in its just released Cyber Threat Index, warning businesses to prepare for an escalating digital risk landscape.
Img uo47hiqi1uzgkfzhl9p8sxfa

Trustwave reveals cybersecurity threats targeting education sector

Fri, 23rd Feb 2024
#
edutech
#
data privacy
#
higher education
Cybersecurity firm Trustwave has revealed unique threats facing the education sector in their latest analysis, 2024 Education Threat Landscape, offering key strategies for building cybersecurity resilience.
Img tshdzqjpflz2cewct86yzwrf

Hackuity achieves SOC 2 Type II compliance for data security

Wed, 21st Feb 2024
#
risk & compliance
#
security vulnerabilities
#
data security
Hackuity, the RBVM company, attains SOC 2 Type II compliance, showcasing strong data security and compliance that uphold rigorous American standards, providing customers with enterprise-grade security assurance.
Img 2zbmmpdip0ifiurys77xgnlz

Armis acquires CTCI, forms AI-powered cybersecurity powerhouse

Thu, 15th Feb 2024
#
ai
#
cybersecurity
#
threat intelligence
Armis acquires AI threat intelligence firm, CTCI, boosting its forecast abilities and creating a powerful new Global Threat Intelligence Service.
Img q8hrdspcrveuw2zswdbfcesl

Trend Micro uncovers Water Hydra's Windows Defender exploit

Thu, 15th Feb 2024
#
ransomware
#
edr
#
cybersecurity
Trend Micro discloses critical zero-day vulnerability in Windows Defender, under malicious exploitation by cyber-threat group, Water Hydra, endangering millions of users globally.
Img ivs1dwo5jqki5n0pfksy5ixo

Rising threats to operational tech & IoT networks, warns Nozomi

Tue, 13th Feb 2024
#
firewalls
#
network security
#
iot security
Network case anomalies surge 19%, marking a rising and sophisticated threat to operational technology and IoT environments, with manufacturing vulnerabilities rocketing 230%, warns Nozomi Networks Labs.
Img pnshhkfoiy69omcwwmddikjb

Milestone Systems teams up with CVE Program for cybersecurity

Wed, 7th Feb 2024
#
digital entertainment
#
video
#
transparency
Video technology leader, Milestone Systems, partners with the Common Vulnerability and Exposures Program, furthering transparency and cooperation in addressing cybersecurity threats.
Cybersecurity trends

2024 cybersecurity trends: AI, cloud and threat intelligence

Tue, 23rd Jan 2024
#
cloud security
#
application security
#
supply chain
We see 2024 shaping up to be the defining moment where AI may become the profound battleground in cybersecurity.
Img bwuqvdhmxt9lyttvb8q84ynu

Cyber attacks double, utilities & manufacturing hardest hit

Tue, 23rd Jan 2024
#
advanced persistent threat protection
#
cybersecurity
#
cto
Armis's report shows cyber attacks globally doubled in 2023, with utilities and manufacturing sectors the hardest hit.
Img arv0qgr97geqjq8qhrl2cdo2

Less than 1% vulnerabilities pose highest risk in 2023, finds Qualys

Thu, 18th Jan 2024
#
malware
#
ransomware
#
advanced persistent threat protection
Less than 1% of security vulnerabilities created the highest risks to businesses in 2023, with 97 high-risk vulnerabilities exploited undetected, says Qualys Threat Research Unit report.
Img gk1dq3e1nthqfldg2ayqwfez

Ivanti VPN vulnerabilities exploited by suspected espionage group UNC5221

Mon, 15th Jan 2024
#
malware
#
vpns
#
advanced persistent threat protection
Suspected espionage group UNC5221 exploited two zero-day vulnerabilities in Ivanti VPN and security appliances, using multiple custom malware families for post-exploitation espionage.
Img bbtjoeroeexskotw4vlzxjwv

Software security strains under supply chain complexity, Slim.AI reveals

Fri, 5th Jan 2024
#
supply chain
#
ai
#
cybersecurity
Over 40% of firms struggle to tackle vulnerabilities in the rising complexity of software supply chains, despite sizeable resource allocation, says Slim.AI's recent Container Report.
Img unz2oto4dkfidv8qdma1gjiu

Operation Triangulation: Undocumented iPhone hardware feature exposed

Thu, 28th Dec 2023
#
devops
#
apm
#
software development
Kaspersky's GReAT team has uncovered an undisclosed iPhone hardware feature used in Operation Triangulation attacks.
Erin stephan

Beware the lasting legacy of the Log4j vulnerability

Mon, 18th Dec 2023
#
application security
#
open source
#
software development
Efforts to mitigate the Log4j vulnerability involve updating to patched versions of Log4j, but the process continues to be complex.
Img ddui8yiwhalehzm6l72btco2

Claroty Team82 discovers cybersecurity threats to industrial automation systems

Thu, 14th Dec 2023
#
data analytics
#
rpa
#
cybersecurity
Team82 at Claroty uncovers substantial cybersecurity vulnerabilities in Operational Technology protocol clients, showing potential for full system control.