SecurityBrief UK - Technology news for CISOs & cybersecurity decision-makers

Security vulnerabilities stories - Page 5

Story image
Jamf report highlights poor cyber hygiene in organisations & individuals
Mon, 26th Feb 2024
#
malware
#
mdm
#
phishing
40% of mobile users and 39% of organisations are vulnerable to cyber threats as they operate devices with known weaknesses, according to Jamf's annual Security 360 report.
Story image
Take a closer look at your company's software supply chain
Wed, 21st Feb 2024
#
saas
#
malware
#
paas
Amid the rise of remote work and cloud technology, firms face increased cyber security risks from poorly managed software supply chains, warns industry expert.
Story image
Hackuity achieves SOC 2 Type II compliance for data security
Wed, 21st Feb 2024
#
risk & compliance
#
security vulnerabilities
#
data security
Hackuity, the RBVM company, attains SOC 2 Type II compliance, showcasing strong data security and compliance that uphold rigorous American standards, providing customers with enterprise-grade security assurance.
Story image
New Barracuda threat report reveals web apps exploitation methods
Tue, 20th Feb 2024
#
firewalls
#
ddos
#
data protection
The Threat Spotlight report by Barracuda Networks reveals a surge in cyberattacks exploiting web application security gaps, with over 18 billion attacks mitigated in 2023.
Story image
Armis acquires CTCI, forms AI-powered cybersecurity powerhouse
Thu, 15th Feb 2024
#
ai
#
cybersecurity
#
threat intelligence
Armis acquires AI threat intelligence firm, CTCI, boosting its forecast abilities and creating a powerful new Global Threat Intelligence Service.
Story image
Australian & NZ workers fear businesses are ill-equipped for cyber threats
Tue, 13th Feb 2024
#
phishing
#
email security
#
casb
Nearly half of Australian and New Zealand workers do not feel ready to combat cyberattack threats, with 43% fearing becoming scam or phishing victims at work, ELMO Software research reveals.
Story image
Absolute Software offers 90-day free support amid Ivanti vulnerabilities
Mon, 5th Feb 2024
#
cybersecurity
#
security vulnerabilities
#
ivanti
Absolute Software steps up amid Ivanti vulnerabilities, offering 90 days of free product licenses and support to potentially affected organisations for cyber resilience.
Story image
Investment Association alerts UK investors of AI trading risks
Fri, 2nd Feb 2024
#
ai
#
cybersecurity
#
investment
UK's Investment Association cautions investors on relying solely on AI and trading bots for investments, noting the potential financial risks and cybersecurity vulnerabilities.
Story image
UK businesses embrace multi-cloud environments, says OVHcloud report
Fri, 2nd Feb 2024
#
security vulnerabilities
#
cloud adoption
#
agility
Amid growing usage, OVHcloud research reveals 62% of large UK organisations are implementing multi-cloud environments, with 64% predicting an increase over the next two years.
Story image
Sternum & ChargePoint secure Home Flex against IoT vulnerabilities
Fri, 26th Jan 2024
#
data analytics
#
martech
#
iot
In a bid to combat IoT vulnerabilities, security firm Sternum collaborates with ChargePoint to enhance the protection of ChargePoint Home Flex, following the uncovering of significant security flaws.
Story image
SecurityBridge rated a top source for SAP vulnerability discoveries
Wed, 24th Jan 2024
#
software
#
sap
#
security vulnerabilities
SecurityBridge's Research Lab is lauded by SAP's Security Response Team as a leading source for detecting software issues. This recognises a key role in fortifying international SAP security infrastructure.
Story image
Less than 1% vulnerabilities pose highest risk in 2023, finds Qualys
Thu, 18th Jan 2024
#
malware
#
ransomware
#
advanced persistent threat protection
Less than 1% of security vulnerabilities created the highest risks to businesses in 2023, with 97 high-risk vulnerabilities exploited undetected, says Qualys Threat Research Unit report.
Story image
Retail theft at self-checkouts doubles, AI poses possible solution
Thu, 18th Jan 2024
#
physical security
#
shopping
#
security vulnerabilities
Surging retail theft via self-checkouts sees cart-based losses doubling in a year, costing the average store over $102k annually, reveals an Everseen report.
Story image
Guardio Labs exposes critical vulnerability in Opera browser
Thu, 18th Jan 2024
#
browsers
#
opera
#
dark web
Guardio Labs uncovers a significant zero-day vulnerability in Opera's browser, threatening its 350 million active users; Opera's 'My-Flow' feature enables act of exploitation.
Story image
Australia's cybersecurity plans overlooked smart home devices, expert warns
Wed, 17th Jan 2024
#
edutech
#
power / energy
#
healthtech
Cybersecurity expert Leon Poggioli believes Australia's proposed cybersecurity law reforms need to pay more heed to smart home devices like solar inverters, crucial for grid stability.
Story image
Report highlights growing cyber vulnerabilities, CISO Darren Humphries comments
Wed, 17th Jan 2024
#
security vulnerabilities
#
report
#
qualys
Critical cyber vulnerabilities are soaring, with 74% of firms struggling to swiftly patch holes, warns Darren Humphries, CISO at technology services provider, Acora.
Story image
Semgrep and HackerOne unite to improve code security reviews
Fri, 12th Jan 2024
#
advanced persistent threat protection
#
software development
#
collaboration
In response to rising cyber threats, Semgrep and HackerOne's PullRequest aim to streamline early vulnerability detection and testing in software development through a new collaborative initiative.
Story image
Software security strains under supply chain complexity, Slim.AI reveals
Fri, 5th Jan 2024
#
supply chain & logistics
#
ai
#
cybersecurity
Over 40% of firms struggle to tackle vulnerabilities in the rising complexity of software supply chains, despite sizeable resource allocation, says Slim.AI's recent Container Report.
Story image
Google Cloud launches tool to detect plaintext credentials for free
Fri, 5th Jan 2024
#
encryption
#
public cloud
#
risk & compliance
Google Cloud launches a secret discovery tool aimed at boosting organisation's security by detecting and monitoring plaintext credentials, part of its no-cost Sensitive Data Protection offering.
Story image
iPhone hardware feature exploited in Operation Triangulation
Thu, 4th Jan 2024
#
it training
#
advanced persistent threat protection
#
soc
Kaspersky reveals hackers have utilised a previously unknown iPhone hardware feature to bypass Apple's memory protections.