SecurityBrief Australia - Technology news for CISOs & cybersecurity decision-makers

Common Vulnerabilities and Exposures (CVE) stories - Page 19

Gettyimages 891422960

IBM X-Force Red & Qualys introduce automated patching

Tue, 19th Feb 2019
#
ibm
#
security vulnerabilities
#
patching
IBM X-Force Red and Qualys are declaring a war on unpatched systems, and they believe automation is the answer.
Malware3

New threat rears its head in new malware report

Thu, 14th Feb 2019
#
malware
#
cybersecurity
#
cryptomalware
Check Point's researchers view Speakup as a significant threat, as it can be used to download and spread any malware.
Manufacturing   ot2

OT attacks and cryptominers on the rise – Skybox

Wed, 30th Jan 2019
#
cloud security
#
iot security
#
report
Skybox Security's 2019 Vulnerability and Threat Trends Report analyzes what shaped the threat landscape over 2018 and what it means for the year ahead.
Cryptojacking3

Malware downloader on the rise in Check Point's latest Threat Index

Wed, 16th Jan 2019
#
malware
#
cybersecurity
#
report
Organisations continue to be targeted by cryptominers, despite an overall drop in value across all cryptocurrencies in 2018.
Malware

2018's worst malware revealed in report

Fri, 2nd Nov 2018
#
malware
#
ransomware
#
ai security
Webroot's 2018 Nastiest Malware report highlights Emotet, Trickbot, and GhostMiner as the latest threats, urging improved cybersecurity measures.
Screen shot 2018 10 03 at 3

Huge vulnerabilities in software supply chain being exploited

Thu, 4th Oct 2018
#
devops
#
supply chain
#
apm
A very exposing report has revealed breaches are rising and response times are falling, largely due to shoddy software development practices.
Img hog1vzd5owi3vpiehyp7urqi

Quick thinking remedies vulnerability in Schneider Electric ICS controller

Fri, 7th Sep 2018
#
datacentre infrastructure
#
power / energy
#
schneider electric
Radiflow discovered that a serious vulnerability in the devices put the safety and availability of ICS networks in jeopardy.
Cybersecurity breach2

Over 2,300 data breaches disclosed so far in 2018 - report

Mon, 20th Aug 2018
#
phishing
#
email security
#
breach prevention
Phishing for and using the stolen credentials to access systems or services stands out as a particularly popular attack method.
Screen shot 2018 08 15 at 11

Exclusive interview: Major MFA vulnerability discovered in Microsoft's ADFS

Wed, 15th Aug 2018
#
mfa
#
iam
#
cybersecurity
A critical flaw in Microsoft's ADFS allows bypassing MFA, posing a severe risk, warns Okta's REX team. Urgent patching is recommended for users.
Gettyimages 1327245423

A deep dive into the present and future of retail off- and online

Wed, 1st Aug 2018
#
martech
#
commerce systems
#
omnichannel
Russell McVeagh Special Counsel Liz Blythe examines the opportunities and risks associated with the eye-wateringly quick pace of change in the sector.
Open source

Exclusive: Why open source is critical to software development

Mon, 23rd Jul 2018
#
dr
#
cloud security
#
open source
Pivotal APJ head Lawrence Crowther discusses the importance of open source and cloud in modern software development.
Thinkstockphotos 547244256

GitHub rolls out security alerts feature for Python

Mon, 16th Jul 2018
#
martech
#
apm
#
software development
GitHub adds security alerts for Python, allowing users to be notified when their code depends on packages with known vulnerabilities.
Secure banking

Use of banking trojans up 50%, cryptomining still dominant malware – report

Tue, 10th Jul 2018
#
malware
#
cybersecurity
#
trojan
Check Point's latest Global Threat Index reveals that Trojan malware families enter Top 10 Most Wanted Ranking; Cryptomining remains top of the list.
4 securty strategies

The top four security strategies and why they're so effective

Mon, 21st May 2018
#
malware
#
ransomware
#
cybersecurity
The top four cybersecurity strategies, including application whitelisting and patching, are proving highly effective against 85% of attacks like ransomware.
Thinkstockphotos 882835538

No need for a browser - XMRig cryptomining malware enters top 10 most wanted malware list

Mon, 16th Apr 2018
#
crypto
#
blockchain
#
cryptomining
Cryptomining malware is shifting its focus from browsers to endpoints, with XMRig rising in popularity among cybercriminals.
Thinkstockphotos 846251202

Attackers exploit macro-less Office documents to create havoc

Tue, 3rd Apr 2018
#
malware
#
firewalls
#
network infrastructure
Cybercriminals use Microsoft Office documents to conduct 'macro-less' attacks that dodge organisations' defences and inject malware.
Screen shot 2018 03 12 at 10

New research finds China tampering with public vulnerability data

Mon, 12th Mar 2018
#
cybersecurity
#
fraud
#
cybercrime
Recorded Future believes China has been altering public vulnerability data to allow the Ministry of State Security to play with it first.
Screen shot 2018 03 06 at 12

REPORT: Ransomware decreasing in quantity but increasing in potency

Wed, 7th Mar 2018
#
malware
#
ransomware
#
supply chain
A new report from SonicWall has shed light on the current threat landscape with the company recording an astonishing 9.32b malware attacks in 2017.
Thinkstockphotos 879913100

State-sponsored North Korean cyberespionage group continues to weaponize tactics

Wed, 21st Feb 2018
#
breach prevention
#
healthtech
#
fireeye
The North Korean threat group known to some as Reaper (APT37) is eyeing bigger targets with more sophisticated tactics.
Thinkstockphotos 880737456

New email spam campaign ditches traditional Office macro infection tactic

Mon, 19th Feb 2018
#
malware
#
email security
#
cybersecurity
A new wave of spam emails use Microsoft Office documents to download password stealers without having to activate Macros.