TelcoNews Asia - Telecommunications news for ICT decision-makers

Common Vulnerabilities and Exposures (CVE) stories - Page 11

Gettyimages 1338188695

Hacktivists used more destructive malware in 2022 - report

Thu, 19th Jan 2023
#
malware
#
ddos
#
iot security
New research from Nozomi Networks has found hacktivists shifted their tactics in 2022 from data theft and DDoS attacks to using more destructive malware.
Gettyimages 1355804078

Claroty's Team82 finds vulnerabilities in historian server

Thu, 19th Jan 2023
#
breach prevention
#
cybersecurity
#
data breach
Claroty's research team, Team82, has examined the GE Proficy Historian, finding five exploitable vulnerabilities capable of causing damage to the system.
Gettyimages 497953315

GreyNoise Intelligence identifies exploitation threats for 2023

Fri, 23rd Dec 2022
#
uc
#
advanced persistent threat protection
#
cybersecurity
GreyNoise Intelligence unveils its 2022 Mass Exploitation Report, delving deep into threat detection events from the past year.
Gettyimages 1335024723

Gallagher named Security Software Manufacturer of the Year

Mon, 28th Nov 2022
#
advanced persistent threat protection
#
integrated products
#
security vulnerabilities
Global security manufacturer Gallagher has been awarded the Security Software Manufacturer of the Year accolade at the 2022 Security & Fire Excellence Awards.
Gettyimages 1331944718

Ransomware activity doubles in transportation, shipping

Fri, 18th Nov 2022
#
ransomware
#
supply chain
#
ai security
The telecom industry ranks globally as the most impacted by ransomware, followed by transportation and shipping.
Checkpoint

Check Point reveals malware impacting 7% of all organisations

Wed, 16th Nov 2022
#
malware
#
advanced persistent threat protection
#
cybersecurity
This month saw keylogger AgentTesla take first place as the most widespread malware, impacting 7% of organisations worldwide.
Gettyimages 466487479

Building a targeted operating cybersecurity model

Wed, 16th Nov 2022
#
data analytics
#
phishing
#
it automation
A cyber-targeted operating model is a unique approach that provides defensibility, transparency, and accountability.
Gettyimages 1252401955

Text4Shell++ - Where there's smoke, there's fire

Mon, 14th Nov 2022
#
martech
#
application security
#
devsecops
Apache's watchTowr Platform has identified dangerous string interpolation operators that could be abused by attackers. .
Gettyimages 1329456430

Claroty's Team82 uncovers new ABB TotalFlow vulnerability

Mon, 14th Nov 2022
#
ransomware
#
cybersecurity
#
security vulnerabilities
New vulnerability found in ABB TotalFlow flow computers and controllers exposes oil and gas utilities to potential attacks.
Gettyimages 1360924437

DevOps tools and infrastructure under attack - report

Fri, 11th Nov 2022
#
devops
#
apm
#
risk & compliance
DevOps tools and infrastructure are facing increased attacks, with API vulnerabilities impacting security focus, according to a report by Wallarm.
Gettyimages 1266665699

Flashpoint releases a new ransomware prediction model

Fri, 11th Nov 2022
#
ransomware
#
risk & compliance
#
cybersecurity
It links individual vulnerabilities in ransomware operations, helping vulnerability management teams prevent potential cyber extortion events with VulnDB.
Gettyimages 1393911505

GitHub Universe: company unveils new enterprise products

Thu, 10th Nov 2022
#
apm
#
open source
#
ai
GitHub has announced a range of new products designed to accelerate the company's push into major enterprises at its San Francisco event.
Gettyimages 1055083194

Time to rethink how to fix software supply chain vulnerabilities

Mon, 7th Nov 2022
#
ransomware
#
it automation
#
supply chain
IT teams are still grappling with the Log4Shell vulnerability, affecting Java enterprise applications and making holiday surprises likely.
Gettyimages 1327932749

Azul launches a new Saas to secure software supply chain

Fri, 4th Nov 2022
#
saas
#
martech
#
supply chain
Azul's Vulnerability Detection, the new SaaS product, continuously detects vulnerabilities in Java applications by eliminating false positives.
Gettyimages 473158924

Claroty reveals new cryptographic key extraction method

Fri, 14th Oct 2022
#
healthtech
#
security vulnerabilities
#
information protection
Claroty's Team82 exposes major security vulnerabilities in Siemens PLCs and Dataprobe's PDUs, prompting urgent updates.
Gettyimages 507473994

A deep dive into a Corporate Espionage operation

Tue, 4th Oct 2022
#
hyperscale
#
public cloud
#
phishing
Rise in hybrid cyberattacks targeting small companies sparks concern over vulnerability exploits, as corporate espionage becomes widespread.
Gettyimages 1162361864

Continuous attack attempts discovered on Atlassian Confluence zero day

Mon, 3rd Oct 2022
#
firewalls
#
ddos
#
breach prevention
Following a coordinated disclosure of a zero-day vulnerability by Volexity in Atlassian Confluence, attackers went wild to exploit it.
Gettyimages 1354202603

Black Lotus Labs discovers new, multipurpose malware

Fri, 30th Sep 2022
#
malware
#
ddos
#
cybersecurity
Black Lotus Labs, the threat intelligence team at Lumen, has discovered a new, rapidly growing, multipurpose malware written in the Go programming language.
Gettyimages 1369133274

Decrease in malware volume, but surge in encrypted malware

Thu, 29th Sep 2022
#
malware
#
firewalls
#
network infrastructure
The Q2 Internet Security Report found office exploits continue to spread more than any other category of malware.
Gettyimages 1324017792

Cybersecurity loopholes prevalent in South East Asia

Tue, 27th Sep 2022
#
advanced persistent threat protection
#
cybersecurity
#
healthtech
In terms of the share of vulnerabilities with publicly available exploits, three countries out of top five are located in Southeast Asia.