DataCenterNews Asia Pacific - Specialist news for cloud & data center decision-makers

Security vulnerabilities stories

Story image
Gallagher named Security Software Manufacturer of the Year
Last week
#
gallagher
#
integrated products
#
security vulnerabilities
Global security manufacturer Gallagher has been awarded the Security Software Manufacturer of the Year accolade at the 2022 Security & Fire Excellence Awards.
Story image
Application Portfolio Management: A quick win today or a crisis tomorrow
Last week
#
digital transformation
#
it debt
#
security vulnerabilities
It’s highly likely that Application Portfolio Management (APM) isn’t at the top of your to-do list. It may not even be on your list anymore.
Story image
HackerOne launches Gold Standard Safe Harbour statement
This month
#
hackers
#
attack
#
customers
The GSSH is a short, broad, easily-understood safe harbour statement that’s simple for customers to adopt, HackerOne states.
Story image
Genetec warns against cyber crime risk from older systems
This month
#
cyber criminal
#
unified threat management
#
security vulnerabilities
With the ever-increasing rise in cyber crime, Genetec is cautioning organisations of all sizes to be vigilant about the cybersecurity risk.
Story image
Varonis Labs discovers SQLi and access flaws in Zendesk
This month
#
cybersecurity
#
zendesk
#
security vulnerabilities
Varonis helped solve an SQLi vulnerability and an access control flaw in Zendesk Explore that would have allowed a threat actor to leak data.
Story image
Aqua Security unveils new Lightning Enforcer offering
This month
#
cybersecurity
#
zero day malware
#
security vulnerabilities
Aqua Security has announced Lightning Enforcer, a new offering designed to stop zero-day attacks and protect critical vulnerabilities in production from being exposed until a patch can be applied.
Story image
Building on the ‘Essential Eight’ with a people-centric approach to cybersecurity
This month
#
iot
#
breach prevention
#
proofpoint
Organisations often combat threats by placing too much emphasis on technology alone and too little emphasis on people and their behaviour.
Story image
Text4Shell++ - Where there’s smoke, there’s fire
This month
#
cybersecurity
#
devsecops
#
security vulnerabilities
While being the generally nefarious and curious people that we are - we noticed some further interesting interpolation operators, which could potentially be abused by an attacker and had not been patched out.
Story image
Claroty's Team82 uncovers new ABB TotalFlow vulnerability
This month
#
ransomware
#
cybersecurity
#
security vulnerabilities
ABB TotalFlow is used within many large oil and gas utilities worldwide to calculate volume and flow rates for oil and gas, which are critical to electric power manufacturing and distribution.
Story image
Flashpoint releases a new ransomware prediction model
This month
#
ransomware
#
cybersecurity
#
predictions
It links individual vulnerabilities in ransomware operations, helping vulnerability management teams prevent potential cyber extortion events with VulnDB.
Story image
GitHub Universe: company unveils new enterprise products
This month
#
app development
#
ai
#
open source
GitHub has announced a range of new products designed to accelerate the company's push into major enterprises at its San Francisco event.
Story image
Video: 10 Minute IT Jams - An update from Azul
This month
#
java
#
security vulnerabilities
#
threat detection
Today on 10 Minute IT Jams, we are joined by Erik Costlow, who is the Senior Director of Product Management, Azul.
Story image
Azul launches a new Saas to secure software supply chain
This month
#
saas
#
cybersecurity
#
java
Azul’s Vulnerability Detection, the new SaaS product, continuously detects vulnerabilities in Java applications by eliminating false positives.
Story image
New Trustwave solution designed to uncover complex vulnerabilities
This month
#
testing
#
enterprise
#
trustwave
"Our proven methodologies allow us to find even the most difficult vulnerabilities and provide a world-class testing solution to global enterprises."
Story image
Varonis uncovers two new Windows vulnerabilities
Last month
#
windows
#
security attack
#
internet explorer
Users don’t have to use Internet Explorer for its legacy to have left you vulnerable to LogCrusher and OverLog.
Story image
Blue Connections improves The Dempsey Group's security posture
Last month
#
network security
#
network management
#
cybersecurity
Blue Connections was chosen by The Dempsey Group to provide a Fortinet network security solution to refresh its ageing network infrastructure.
Story image
Claroty reveals new cryptographic key extraction method
Last month
#
security vulnerabilities
#
information protection
#
claroty
Claroty's Team82 has developed a new, innovative method to extract heavily guarded, hardcoded, global private cryptographic keys embedded within the Siemens SIMATIC S7-1200/1500 PLC and TIA Portal product lines.
Story image
Trellix advances threat intelligence with new research centre
Tue 27 Sep 2022
#
ai
#
ai security
#
security vulnerabilities
Trellix has announced the establishment of the Trellix Advanced Research Center to advance global threat intelligence.
Story image
Secure Code Warrior announces Coding Labs innovation
Fri 23 Sep 2022
#
cybersecurity
#
web development
#
security vulnerabilities
Coding Labs mechanisms allow developers to move from learning to applying secure coding knowledge more efficiently, leading to fewer code vulnerabilities.
Story image
Vectra Protect team finds Microsoft Teams vulnerability
Fri 23 Sep 2022
#
uc
#
phishing
#
microsoft teams
The Vectra Protect team identified a post-exploitation opportunity in August, allowing malicious actors to steal valid user credentials from Microsoft Teams.
Story image
Claroty finds seven vulnerabilities in Dataprobe iBoot-PDU
Thu 22 Sep 2022
#
security vulnerabilities
#
pdu
#
claroty
The Claroty research team (Team82) has found seven vulnerabilities in Dataprobe's iBoot-PDU, the company's intelligent power distribution unit product.
Story image
Apathetic Kiwis a mouthwatering prospect for cybercriminals
Wed 7 Sep 2022
#
cybersecurity
#
security vulnerabilities
#
cyber attacks
The most significant and most exploited cybersecurity vulnerability of any New Zealand organisation is its people.
Story image
Internet of Things vulnerability disclosures grew 57%
Fri 26 Aug 2022
#
cybersecurity
#
iot
#
security vulnerabilities
Vulnerability disclosures impacting IoT devices increased by 57% in the first half of 2022 compared to the previous six months.
Story image
Check Point Research finds vulnerabilities in Xiaomi's mobile payment mechanism
Thu 18 Aug 2022
#
commerce systems
#
payment gateways
#
research
Check Point Software's research teams have uncovered vulnerabilities in Xiaomi's mobile payment mechanism.
© 2022 Techday, All rights reserved. Hosted on Plan B's Cloud Services. DMARC protection by PowerDMARC.