SecurityBrief Australia - Technology news for CISOs & cybersecurity decision-makers

Security vulnerabilities stories

Story image
DerScanner introduces Supply Chain Security to protect third-party code elements
Last week
#
cybersecurity
#
hackers
#
security vulnerabilities
DerScanner adds Supply Chain Security feature to verify third-party code, combating rising threats amid increasing open-source software cyberattacks.
Story image
The pressing need for self-healing apps and network resilience
Last week
#
data protection
#
cybersecurity
#
security vulnerabilities
Alarming new data reveals significant vulnerabilities that, if ignored, could lead to catastrophic consequences for enterprises.
Story image
Exclusive: Qualys' risk-based approach to cybersecurity
Last week
#
cybersecurity
#
security vulnerabilities
#
qualys
Qualys, a provider of cloud-based security and compliance solutions, has been pivotal in aiding companies through their digital transformation.
Story image
UK employees jeopardise workplace cybersecurity with unauthorised downloads
Last month
#
cybersecurity
#
compliance
#
risk
Two-thirds of UK employees are endangering business cybersecurity by unauthorised app downloads, often unbeknown to IT departments, Armis research reveals.
Story image
Cloud native security threats concern 75% of IT & security leaders
Last month
#
cybersecurity
#
devops
#
it
New research shows that IT and security leaders believe Kubernetes will play a major role in app development, but are concerned about security.
Story image
GitHub's AI revolution: Transforming code language & developer experience
Last month
#
open source
#
github
#
security vulnerabilities
GitHub announces an AI-driven platform that integrates AI into every phase of development, introducing natural language as a universal programming language.
Story image
Updating Apple devices in the era of rapid security responses
Last month
#
byod
#
siem
#
apple
Every organisation employing Apple devices must develop and follow a clear strategy to handle Apple’s new RSR approach to OS upgrades.
Story image
In today’s data-driven world, compromising on cybersecurity is not an option
Last month
#
cybersecurity
#
fintech
#
threat intelligence
As the global financial ecosystem expands, it's getting harder for organisations to navigate the maze of cyber risks alone.
Story image
BeyondTrust experts forecast key cybersecurity threats for 2024
Last month
#
voip
#
malware
#
cybersecurity
BeyondTrust’s cybersecurity experts predict the main global threats for 2024, including advanced AI threats and a rise in subscription-based model risks.
Story image
Winter Vivern exploits webmail server vulnerability targets European governments
Wed, 1st Nov 2023
#
surveillance
#
cybersecurity
#
security vulnerabilities
Winter Vivern cyber group targets European governments using XSS vulnerability of Roundcube Webmail server, as ESET researchers have discovered.
Story image
Generative AI: A disruptive force at the hands of cyber attackers
Tue, 31st Oct 2023
#
phishing
#
cybersecurity
#
ai
Generative AI tools in the wrong hands are a serious threat, which is why their use must be regulated properly.
Story image
The IT industry is stalling on SBOMs when it should be working on best practice
Tue, 24th Oct 2023
#
open source
#
security vulnerabilities
#
it industry
SBOMs will be key to dealing with the next big vulnerability and incredibly useful in the fight to minimise the effects of smaller weaknesses.
Story image
Microsoft research highlights vulnerabilities in ChatGPT models
Thu, 19th Oct 2023
#
cybersecurity
#
ai
#
security vulnerabilities
Researchers have discovered vulnerabilities in the trustworthiness of GPT models, raising concerns about toxic and biased outputs.
Story image
Zyxel Networks launches game-changing WiFi 7 access point for business use
Wed, 18th Oct 2023
#
wifi
#
security vulnerabilities
#
zyxel
Zyxel Networks unveils its first WiFi 7 access point, promising to revolutionise high-density business connectivity.
Story image
Vitrana reduces software security vulnerabilities by 66% using CAST
Mon, 16th Oct 2023
#
cybersecurity
#
security vulnerabilities
#
threat detection
Global platform provider Vitrana leverages CAST technology to slash its software security vulnerabilities by 66%.
Story image
Organisations fail to see benefit of ethical hacking - report
Fri, 13th Oct 2023
#
cybersecurity
#
hackers
#
risk
52% of security professionals prefer to accept undiscovered vulnerabilities than work with hackers, HackerOne data shows.
Story image
Hackuity launches Version 2.0 of next gen vulnerability management
Fri, 13th Oct 2023
#
attack
#
risk
#
threat intelligence
Hackuity, the risk-based vulnerability management provider, has launched Version 2.0 of its platform with major enhancements to support risk prioritisation.
Story image
Ordr announces integration with ServiceNow vulnerability response
Fri, 6th Oct 2023
#
iot security
#
iot
#
partner programmes
Joint solution closes visibility gaps, optimizing vulnerability management for all managed and unmanaged devices, including IoT, IoMT and OT.
Story image
Interactive announces partnership with CrowdStrike
Fri, 6th Oct 2023
#
cybersecurity
#
xdr
#
security vulnerabilities
The partnership expands Interactive's cybersecurity offering and strengthens its position as a leader in the technology industry.
Story image
78% of organisations under-report cyberattacks: ISACA
Fri, 6th Oct 2023
#
cloud services
#
cybersecurity
#
skills shortage
Interestingly, only 42% of respondents in Oceania say their organisation conducts a cyber-risk assessment at least annually, compared to 43% in 2022.
Story image
Severe 'Looney Tunables' security flaw found in some Linux editions
Wed, 4th Oct 2023
#
cybersecurity
#
linux
#
security vulnerabilities
Major security flaw, 'Looney Tunables', detected in glibc, threatens Linux distributions, urgent patch recommended.
Story image
Keysight and Synopsys partner for IoT device cybersecurity
Fri, 29th Sep 2023
#
iot security
#
cybersecurity
#
iot
Synopsys Defensics fuzz testing software is now embedded into Keysight’s IoT Security Assessment solution, which reduces costs while speeding up time-to-market.
Story image
GOLD MELODY acts as initial access broker, says Secureworks report
Tue, 26th Sep 2023
#
cybersecurity
#
secureworks
#
security vulnerabilities
GOLD MELODY identified as cyber threat group selling access to compromised organisations to other criminals. Active since 2017.
Story image
No dedicated hardware security for 66% IoT modules: IoT Analytics
Fri, 22nd Sep 2023
#
iot security
#
bi
#
iot
The report reveals that 29% of IoT modules had no security features, exposing them to potential risks and vulnerabilities.