CFOtech UK - Technology news for CFOs & financial decision-makers

Security vulnerabilities stories - Page 19

Gettyimages 1325472963

Severe vulnerabilities in appsec environments taking longer to fix - NTT Security

Wed, 25th Aug 2021
#
application security
#
healthtech
#
security vulnerabilities
The average time to remediate the most severe vulnerabilities in an organisation's IT infrastructure has now reached 256 days.
Gettyimages 1301188874

Ivanti tackles today's biggest security threats with RiskSense acquisition

Wed, 4th Aug 2021
#
malware
#
ransomware
#
cybersecurity
Ivanti has acquired risk-based vulnerability management specialist RiskSense to enhance its patch management capabilities.
Gettyimages 497953315

SonicWall vulnerability allows attackers to obtain full control of device and underlying OS

Wed, 7th Jul 2021
#
cybersecurity
#
sonicwall
#
security vulnerabilities
Positive Technologies reveals critical vulnerability in SonicWall Network Security Manager, allowing authenticated attackers full control.
Gettyimages 817486116

A look at the MS Exchange zero-days and how to protect your business

Thu, 29th Apr 2021
#
firewalls
#
network infrastructure
#
network security
Every organisationusing Microsoft Exchange must patch their on-premise servers immediately and scan their networks for signs of malicious activity.
Gettyimages 904483442

Claroty discovers vulnerabilities in Ovarro TBox RTUs

Tue, 30th Mar 2021
#
manufacturing
#
cybersecurity
#
security vulnerabilities
Widespread vulnerabilities have been found in Ovarro's TBox remote terminal units, posing a threat to industrial facilities.
Gettyimages 473158924  3

Research reveals increase in critical, low complexity vulnerabilities

Fri, 19th Feb 2021
#
iot security
#
cybersecurity
#
security vulnerabilities
Critical and low complexity vulnerabilities are on the rise, with over 10,000 logged in 2020, according to a new study by Redscan.
Gettyimages 1181166035  6

Vulnerability disclosures back to expected rates despite COVID-19 disruption

Tue, 16th Feb 2021
#
security vulnerabilities
#
risk based security
#
covid-19
Vulnerability disclosures are returning to normal levels, with 2020 on track to surpass 2019, according to a report by Risk Based Security.
Gettyimages 812947990

AppDynamics launches Cisco Secure Application to protect against vulnerabilities

Thu, 11th Feb 2021
#
devops
#
application security
#
multi-cloud
AppDynamics, part of Cisco, has released Cisco Secure Application, a solution designed to simplify vulnerability management.
Gettyimages 1128503636

Datadog & Snyk integrate vulnerability management into GitHub

Tue, 15th Dec 2020
#
devops
#
siem
#
martech
Datadog and Snyk integrate with GitHub, allowing developers to use Datadog's CI/CD capabilities in their workflows.
Gettyimages 473158924

Claroty finds four vulnerabilities in Schneider Electric OT device

Thu, 19th Nov 2020
#
datacentre infrastructure
#
encryption
#
power / energy
Unmitigated vulnerabilities could give an attacker access to the device, enabling the attacker to break encryption, modify code, and run certain commands.
Positive tech

Companies exploited by high-risk vulnerabilities, new research shows

Wed, 4th Nov 2020
#
security vulnerabilities
#
exploits
#
positive technologies
84% of companies have high-risk vulnerabilities on their network perimeter, with half of them fixable through software updates, says Positive Technologies.
Gettyimages 465135327

McAfee finds vulnerabilities in 'temi' the videoconferencing robot

Tue, 22nd Sep 2020
#
robots
#
uc
#
casb
Temi is commonly used in environments including businesses, healthcare, retail, hospitality, and other environments including the home.
Gettyimages 586063360

OT networks warned of vulnerabilities in CodeMeter software

Wed, 16th Sep 2020
#
iot
#
iiot
#
security vulnerabilities
Manufacturers using Wibu-Systems CodeMeter are urged to update to version 7.10 due to vulnerabilities that could allow attackers to take control of OT networks.
Gettyimages 1054070700

Ripple20 threat has potential for 'vast exploitation', ExtraHop researchers find

Tue, 15th Sep 2020
#
advanced persistent threat protection
#
supply chain
#
ndr
One in three IT environments vulnerable to Ripple20 cyber threat, says ExtraHop. Attackers can exploit 19 vulnerabilities in the Treck networking stack.
Gettyimages 1155157574

Ripple20 threat could affect 35% of all IT environments – ExtraHop

Mon, 14th Sep 2020
#
advanced persistent threat protection
#
supply chain
#
healthtech
The vulnerabilities have the potential to 'ripple' through complex software supply chains, enabling attackers to steal data or execute code.
Gettyimages 473158924

VPN vulnerabilities pose serious risk to OT Networks

Thu, 30th Jul 2020
#
ddos
#
vpns
#
security vulnerabilities
Vulnerable VPN servers and clients used in critical industries have been discovered by cybersecurity firm Claroty, potentially leading to security breaches.
Gettyimages 1250922825

C-DATA OLT firmware has intentional backdoors, allege researchers

Mon, 13th Jul 2020
#
encryption
#
cybersecurity
#
security vulnerabilities
A range of optical line termination (OLT) devices made by China-based manufacturer and vendor C-DATA may be riddled with vulnerabilities and backdoors.
Gettyimages 473158924

Cisco ASA firewall users urged to patch systems now

Mon, 11th May 2020
#
firewalls
#
network infrastructure
#
network security
Since early January 2020, the number of internet-accessible Cisco ASA devices considered vulnerable has jumped from 170,000 to 220,000.
Gettyimages 1067143054

Microsoft IE vulnerability to go unpatched until mid-Feb

Tue, 28th Jan 2020
#
microsoft
#
internet explorer
#
zero day malware
A blog post from security vendor ESET has outlined the risk of the zero-day for those who are still using the relic browser of internet-past.
Cyber hack

Zero-day Internet Explorer vulnerability exploited in the wild

Wed, 25th Sep 2019
#
microsoft
#
security vulnerabilities
#
patching
Microsoft released an out-of-band patch for the vulnerability discovered by Google researchers due to the report that it has been exploited in the wild.