CFOtech UK - Technology news for CFOs & financial decision-makers

Security vulnerabilities stories - Page 14

Story image
What is Log4J and how does it affect you?
Fri, 24th Dec 2021
#
martech
#
cybersecurity
#
software development
Log4J software bug, aka Log4Shell, sparks concern as it affects various platforms. Norton Labs offers advice on protecting systems and applications.
Story image
New threat intelligence from Sophos following the Apache Log4Shell vulnerability
Wed, 15th Dec 2021
#
malware
#
firewalls
#
network infrastructure
Sophos warns of a surge in cyberattacks exploiting the Apache Log4Shell vulnerability, with attempts exceeding hundreds of thousands so far.
Story image
Log4j actively exploited, serious complications can occur according to CERT NZ
Mon, 13th Dec 2021
#
martech
#
breach prevention
#
cybersecurity
The widely-used java logging library, log4j, has been actively exploited, according to an update from CERT NZ and Catalyst.
Story image
Claroty and JFrog discover 14 vulnerabilities in Busybox
Fri, 19th Nov 2021
#
open source
#
linux
#
security vulnerabilities
Team82 and JFrog discover 14 vulnerabilities in the latest version of BusyBox, affecting OT and IoT devices running on Linux.
Story image
New Microsoft Defender vulnerability should concern every enterprise - expert
Mon, 15th Nov 2021
#
cybersecurity
#
microsoft
#
security vulnerabilities
Microsoft Defender vulnerability poses significant threat, warns Virsec. With 55 vulnerabilities in total, it is deemed the most concerning by experts.
Story image
API vulnerabilities are a huge target for cyber criminals, report finds
Thu, 28th Oct 2021
#
ddos
#
software development
#
akamai
API vulnerabilities pose a significant risk to companies and individuals worldwide, according to new research by Akamai Technologies.
Story image
ATM vulnerabilities open door for attacks - report
Thu, 28th Oct 2021
#
breach prevention
#
cybersecurity
#
atms
Vulnerabilities in Wincor Cineo ATMs allow attackers to bypass encryption and make cash withdrawals, according to researchers.
Story image
Interview: Invicti's Mark Ralls on the new defining age for web application security
Thu, 30th Sep 2021
#
cybersecurity
#
security vulnerabilities
#
web applications
Invicti, the cybersecurity firm, has combined web application security expertise from its 2018 merger of Netsparker and Acunetix. .
Story image
Apple urgently patches exploits across several operating systems
Wed, 15th Sep 2021
#
cybersecurity
#
personal computing devices
#
security vulnerabilities
Apple has urgently released patches for multiple software products due to vulnerabilities that may be linked to the Pegasus spyware.
Story image
Privacy Commissioner John Edwards tipped for top role as UK Information Commissioner
Fri, 27th Aug 2021
#
breach prevention
#
healthtech
#
waikato district health board
Privacy Commissioner John Edwards named preferred candidate for UK Information Commissioner, pending UK Parliament's decision.
Story image
Severe vulnerabilities in appsec environments taking longer to fix - NTT Security
Wed, 25th Aug 2021
#
application security
#
security vulnerabilities
#
ntt security
The average time to remediate the most severe vulnerabilities in an organisation’s IT infrastructure has now reached 256 days.
Story image
Ivanti tackles today's biggest security threats with RiskSense acquisition
Wed, 4th Aug 2021
#
ransomware
#
malware
#
cybersecurity
Ivanti has acquired risk-based vulnerability management specialist RiskSense to enhance its patch management capabilities.
Story image
SonicWall vulnerability allows attackers to obtain full control of device and underlying OS
Wed, 7th Jul 2021
#
cybersecurity
#
sonicwall
#
security vulnerabilities
Positive Technologies reveals critical vulnerability in SonicWall Network Security Manager, allowing authenticated attackers full control.
Story image
A look at the MS Exchange zero-days and how to protect your business
Thu, 29th Apr 2021
#
network infrastructure
#
firewalls
#
network security
Every organisationusing Microsoft Exchange must patch their on-premise servers immediately and scan their networks for signs of malicious activity.
Story image
Claroty discovers vulnerabilities in Ovarro TBox RTUs
Tue, 30th Mar 2021
#
it in manufacturing
#
cybersecurity
#
security vulnerabilities
Widespread vulnerabilities have been found in Ovarro's TBox remote terminal units, posing a threat to industrial facilities.
Story image
Latest Tenable launch provides holistic approach to vulnerability management
Wed, 24th Feb 2021
#
security vulnerabilities
#
tenable network security
#
recogni
Tenable launches risk-based vulnerability management platform Tenable.ep, combining its products into a single solution. .
Story image
Research reveals increase in critical, low complexity vulnerabilities
Fri, 19th Feb 2021
#
iot security
#
cybersecurity
#
security vulnerabilities
Critical and low complexity vulnerabilities are on the rise, with over 10,000 logged in 2020, according to a new study by Redscan.
Story image
Vulnerability disclosures back to expected rates despite COVID-19 disruption
Tue, 16th Feb 2021
#
security vulnerabilities
#
risk based security
#
covid-19
Vulnerability disclosures are returning to normal levels, with 2020 on track to surpass 2019, according to a report by Risk Based Security.
Story image
AppDynamics launches Cisco Secure Application to protect against vulnerabilities
Thu, 11th Feb 2021
#
application security
#
devops
#
multi-cloud
AppDynamics, part of Cisco, has released Cisco Secure Application, a solution designed to simplify vulnerability management.
Story image
Datadog & Snyk integrate vulnerability management into GitHub
Tue, 15th Dec 2020
#
devops
#
siem
#
martech
Datadog and Snyk integrate with GitHub, allowing developers to use Datadog's CI/CD capabilities in their workflows.