Common Vulnerabilities and Exposures (CVE) stories - Page 17
Huge vulnerabilities in software supply chain being exploited
Thu, 4th Oct 2018
#
devops
#
supply chain
#
apm
A very exposing report has revealed breaches are rising and response times are falling, largely due to shoddy software development practices.
Quick thinking remedies vulnerability in Schneider Electric ICS controller
Fri, 7th Sep 2018
#
datacentre infrastructure
#
power / energy
#
schneider electric
Radiflow discovered that a serious vulnerability in the devices put the safety and availability of ICS networks in jeopardy.
Over 2,300 data breaches disclosed so far in 2018 - report
Mon, 20th Aug 2018
#
phishing
#
email security
#
breach prevention
Phishing for and using the stolen credentials to access systems or services stands out as a particularly popular attack method.
Exclusive interview: Major MFA vulnerability discovered in Microsoft's ADFS
Wed, 15th Aug 2018
#
mfa
#
iam
#
cybersecurity
A critical flaw in Microsoft's ADFS allows bypassing MFA, posing a severe risk, warns Okta's REX team. Urgent patching is recommended for users.
A deep dive into the present and future of retail off- and online
Wed, 1st Aug 2018
#
martech
#
commerce systems
#
omnichannel
Russell McVeagh Special Counsel Liz Blythe examines the opportunities and risks associated with the eye-wateringly quick pace of change in the sector.
GitHub rolls out security alerts feature for Python
Mon, 16th Jul 2018
#
martech
#
apm
#
software development
GitHub adds security alerts for Python, allowing users to be notified when their code depends on packages with known vulnerabilities.
Use of banking trojans up 50%, cryptomining still dominant malware – report
Tue, 10th Jul 2018
#
malware
#
cybersecurity
#
trojan
Check Point's latest Global Threat Index reveals that Trojan malware families enter Top 10 Most Wanted Ranking; Cryptomining remains top of the list.
No need for a browser - XMRig cryptomining malware enters top 10 most wanted malware list
Mon, 16th Apr 2018
#
crypto
#
blockchain
#
cryptomining
Cryptomining malware is shifting its focus from browsers to endpoints, with XMRig rising in popularity among cybercriminals.
'URL file outbreak' used to distribute Quant Loader Trojan
Wed, 11th Apr 2018
#
malware
#
firewalls
#
ransomware
Barracuda Networks is tracking a potentially dangerous 'URL file outbreak' that distribute the Quant Loader Trojan.
China cyberespionage group targets US maritime & engineering sectors
Mon, 19th Mar 2018
#
malware
#
breach prevention
#
cybersecurity
A China-based cyberespionage group may be targeting United States engineering and maritime industries tied up in activities about the South China Sea.
New research finds China tampering with public vulnerability data
Mon, 12th Mar 2018
#
cybersecurity
#
fraud
#
cybercrime
Recorded Future believes China has been altering public vulnerability data to allow the Ministry of State Security to play with it first.
REPORT: Ransomware decreasing in quantity but increasing in potency
Wed, 7th Mar 2018
#
malware
#
ransomware
#
supply chain
A new report from SonicWall has shed light on the current threat landscape with the company recording an astonishing 9.32b malware attacks in 2017.
Chinese websites targeted in drive-by download attack that drops DDoS bot
Tue, 27th Feb 2018
#
ddos
#
botnet
#
malwarebytes
Chinese websites are under siege by a drive-by download campaign planting the decade-old Avzhan DDoS bot, Malwarebytes Labs reveals.
New email spam campaign ditches traditional Office macro infection tactic
Mon, 19th Feb 2018
#
malware
#
email security
#
cybersecurity
A new wave of spam emails use Microsoft Office documents to download password stealers without having to activate Macros.
ASUSTOR responds to Spectre & Meltdown with ADM update
Wed, 14th Feb 2018
#
semiconductors
#
intel
#
asustor
ASUSTOR is releasing updates to its ADM this week as part of its efforts to fix the Meltdown security vulnerabilities.
Attackers unleash Lokibot malware on unpatched Windows systems
Tue, 13th Feb 2018
#
malware
#
cybersecurity
#
microsoft
Lokibot malware targets unpatched Windows systems exploiting CVE-2017-11882; researchers urge timely updates and restricted installer access to combat threats.
42% of Alexa-ranked websites are open invites for attackers
Wed, 7th Feb 2018
#
uc
#
phishing
#
email security
A staggering 42% of top Alexa-ranked websites are vulnerable to cyber-attacks due to outdated software and compromised content, finds Menlo Security.
North Korean threat group suspected to be behind Adobe Flash exploit
Mon, 5th Feb 2018
#
martech
#
breach prevention
#
adobe
An exploit that targeted an Adobe Flash vulnerability looks to be the work of a North Korean group called TEMP.Reaper.
Oracle MICROS POS vulnerability may compromise 330,000 POS systems
Fri, 2nd Feb 2018
#
martech
#
commerce systems
#
supply chain
A vulnerability in Oracle's POS systems may affect more than 330,000 payment systems across the globe, putting files and sensitive information at risk.
Zyklon HTTP malware creates gaping backdoors through MS Office exploits
Mon, 22nd Jan 2018
#
malware
#
ddos
#
breach prevention
Zyklon HTTP malware is described as a publicly-available and fully featured backdoor that is able to conduct DDoS attacks, steal passwords...