TelcoNews Asia - Telecommunications news for ICT decision-makers

Common Vulnerabilities and Exposures (CVE) stories - Page 15

Gettyimages 936338884  5

Cyber incidents on the rise as ransomware accounts for two thirds of all malware attacks

Thu, 15th Jul 2021
#
malware
#
ransomware
#
cybersecurity
Ransomware makes up two-thirds of all malware attacks, as cyber incidents continue to rise, according to Positive Technologies.
Gettyimages 1147316753

Kaspersky Password Manager could be 'bruteforced in seconds'

Mon, 12th Jul 2021
#
passwordless
#
cybersecurity
#
kaspersky
As people and enterprises put their trust in password managers to secure their accounts, even well-built password managers can be fatally flawed.
Gettyimages 497953315

SonicWall vulnerability allows attackers to obtain full control of device and underlying OS

Wed, 7th Jul 2021
#
cybersecurity
#
sonicwall
#
security vulnerabilities
Positive Technologies reveals critical vulnerability in SonicWall Network Security Manager, allowing authenticated attackers full control.
Gettyimages 473158924  5

Vulnerabilities discovered in Cisco IT infrastructure deployment solution

Wed, 23rd Jun 2021
#
dr
#
converged infrastructure
#
ndr
Researchers at Positive Technologies have discovered three vulnerabilities in Cisco HyperFlex HX that could disrupt enterprise operations.
Gettyimages 1061227424

The most common attack surface trends by company location, size, and industry

Tue, 22nd Jun 2021
#
ddos
#
hybrid & remote work
#
cybersecurity
A new report identifies the most common attack surface trends by geography and company size and highlights industries most vulnerable.
Gettyimages 811239600  2

Trickbot takes over from Dridex as most prevalent malware

Fri, 11th Jun 2021
#
malware
#
ransomware
#
cybersecurity
Established Dridex trojan has dropped off altogether after being one of the most popular malwares in recent months amidst a global surge in ransomware.
Cybersecurity layers

Defence engineering and threat intel — no stone left unturned

Thu, 27th May 2021
#
siem
#
threat intelligence
#
opinion
Understanding the limitations of defences requires examining how blocking and detection systems leverage cyber threat intelligence.
Gettyimages 585302424  2

Most wanted malware Dridex remains in top position amidst global surge in ransomware attacks

Fri, 14th May 2021
#
malware
#
ransomware
#
cybersecurity
The Dridex trojan remains the most prevalent malware, often used in the initial stages of ransomware attacks, says Check Point Research.
Gettyimages 817486116

A look at the MS Exchange zero-days and how to protect your business

Thu, 29th Apr 2021
#
firewalls
#
network infrastructure
#
network security
Every organisationusing Microsoft Exchange must patch their on-premise servers immediately and scan their networks for signs of malicious activity.
Gettyimages 1198811723

Kaspersky discovers zero-day exploit in Desktop Window Manager

Mon, 19th Apr 2021
#
microsoft
#
kaspersky
#
zero day malware
While analysing the CVE-2021-1732 exploit, Kaspersky experts found another such zero-day exploit and reported it to Microsoft.
Gettyimages 904483442

Claroty discovers vulnerabilities in Ovarro TBox RTUs

Tue, 30th Mar 2021
#
manufacturing
#
cybersecurity
#
security vulnerabilities
Widespread vulnerabilities have been found in Ovarro's TBox remote terminal units, posing a threat to industrial facilities.
Gettyimages 1210966954

IoT botnets: Perspectives from a residential router

Tue, 23rd Mar 2021
#
malware
#
ddos
#
iot
Surprisingly, a vast volume of malicious traffic can reach a residential device, writes Radware head of research Daniel Smith.
Gettyimages 1221761167

Almost a third of malware threats previously unknown - HP report

Tue, 23rd Mar 2021
#
malware
#
cybersecurity
#
hp
New report reveals that 29% of malware captured was previously unknown due to attackers using packers and obfuscation techniques.
Gettyimages 473158924  3

Research reveals increase in critical, low complexity vulnerabilities

Fri, 19th Feb 2021
#
iot security
#
cybersecurity
#
security vulnerabilities
Critical and low complexity vulnerabilities are on the rise, with over 10,000 logged in 2020, according to a new study by Redscan.
Gettyimages 811239600  1

2021's Most Wanted: Emotet continues reign as top malware threat

Wed, 17th Feb 2021
#
malware
#
cybersecurity
#
emotet
The Emotet trojan continues to reign as top malware in January, despite international law enforcement taking control of its infrastructure.
Gettyimages 1181166035  6

Vulnerability disclosures back to expected rates despite COVID-19 disruption

Tue, 16th Feb 2021
#
security vulnerabilities
#
risk based security
#
covid-19
Vulnerability disclosures are returning to normal levels, with 2020 on track to surpass 2019, according to a report by Risk Based Security.
Cybersecurity breach2

Sophos unearths origin of prominent cryptominer

Fri, 22nd Jan 2021
#
firewalls
#
network infrastructure
#
network security
The cryptominer was recently discovered when attackers targeted internet-facing database servers (SQL servers), and the MrbMiner was downloaded and installed.
Gettyimages 637950732

Check Point uncovers live Linux attack, urges users to take action

Wed, 20th Jan 2021
#
ddos
#
open source
#
cybersecurity
Ongoing cyber attacks targeting Linux systems have been discovered, with users urged to patch their systems immediately, warns Check Point Research.
Cybersecurity8

Sophos named a Numbering Authority in CVE programme

Tue, 19th Jan 2021
#
firewalls
#
network infrastructure
#
network security
Sophos has become a Numbering Authority in the Common Vulnerabilities and Exposures programme, enabling it to assign CVE identification to its own products.
Cybersecurity28

22 billion records exposed from breaches in 2020 — report

Fri, 15th Jan 2021
#
vpns
#
breach prevention
#
cybersecurity
The research also found that 35% of the breaches recorded by Tenable were caused by ransomware attacks, while 14% of breaches stemmed from email compromises.