SecurityBrief Australia - Technology news for CISOs & cybersecurity decision-makers

Security vulnerabilities stories - Page 2

Story image
Qualys unveils CyberSecurity Asset Management 3.0 for real-time vulnerability insights
Tue, 7th May 2024
#
cybersecurity
#
iot
#
security vulnerabilities
Qualys unveils CyberSecurity Asset Management 3.0, enhancing its External Attack Surface Management solution, reducing false positives by 60% and uncovering 34% more assets in an initiative to tackle hidden cyber risk.
Story image
NetSPI unveils unified platform bolstering proactive cybersecurity
Tue, 7th May 2024
#
ransomware
#
devops
#
apm
NetSPI unveils a unified security platform featuring AI and automation to help businesses tackle exposure risk and security vulnerabilities proactively amid rising ransomware threats.
Story image
Businesses weigh up transition from best-of-breed to platform security
Fri, 3rd May 2024
#
cybersecurity
#
security vulnerabilities
#
cyber attacks
Businesses rethink traditional cybersecurity practices, moving towards platform security amid findings suggesting additional benefits such as cost efficiency and improved attack response. Experts advise due diligence.
Story image
Sysdig introduces AI Workload Security for enhanced cloud risk management
Wed, 1st May 2024
#
advanced persistent threat protection
#
application security
#
breach prevention
Sysdig unveils AI Workload Security to provide real-time cloud risk assessment, boosting visibility in AI infrastructures for swift response to threats and aiding regulatory compliance.
Story image
Sevco Security drives resolution of enterprise vulnerabilities
Wed, 1st May 2024
#
it automation
#
risk & compliance
#
security vulnerabilities
Sevco Security further evolves asset protection by prioritising, automating and validating exposure issues resolution with its upgraded platform, aiding cyber risk management for businesses.
Story image
Backslash Security unveils security risks in AI-generated code
Wed, 1st May 2024
#
ai
#
security
#
security vulnerabilities
Backslash Security reveals security oversights tied to AI-generated code in their recent GPT-4 developer simulation exercise, shedding light on unexpected vulnerabilities introduced by third-party open-source software.
Story image
Portnox teams up with Bugcrowd for private bug bounty programme
Mon, 29th Apr 2024
#
advanced persistent threat protection
#
security vulnerabilities
#
hackers
Cloud-native access control solutions provider, Portnox, is launching a private bug-bounty scheme in collaboration with Bugcrowd, incentivising white-hat hackers to identify security vulnerabilities for financial rewards.
Story image
Open source vulnerabilities will hamper the next generation of the web
Thu, 25th Apr 2024
#
martech
#
ecm
#
open source
Open source flaws threaten to destabilise the development of new web innovations, such as Web 3.0 and the metaverse, according to a survey by global content management system provider, Forrit.
Story image
Beyond the CVE: Illuminating inherent security issues in device configuration
Wed, 24th Apr 2024
#
network infrastructure
#
breach prevention
#
cybersecurity
Beyond the CVE addresses how neglecting device misconfigurations can exacerbate vulnerabilities and risk breaches, demanding constant scrutiny and remediation.
Story image
Five top concerns in private cloud visibility
Tue, 23rd Apr 2024
#
private cloud
#
malware
#
breach prevention
Despite progress in perimeter security, the focus has shifted to private cloud networks, where insider threats prove costly.
Story image
BeyondTrust's 2024 report reveals top Microsoft vulnerabilities
Tue, 23rd Apr 2024
#
advanced persistent threat protection
#
security vulnerabilities
#
cloud services
BeyondTrust's 2024 Microsoft Vulnerabilities Report shows Elevation of Privilege (EoP) dominating the vulnerability class for a fourth year.
Story image
Cado Security unmasks Cerber ransomware threat to Confluence servers
Wed, 17th Apr 2024
#
ransomware
#
encryption
#
cybersecurity
Cyber security firm, Cado Security, uncovers revelations about a Linux variant of Cerber ransomware exploiting vulnerabilities in Confluence servers using the CVE-2023-22518 exploit.
Story image
FICO survey reveals identity theft & fraud fears among Indonesians
Mon, 1st Apr 2024
#
physical security
#
fintechs
#
financial systems
FICO's study reveals prolonged fears of identity theft among Indonesians, as 36% remain anxious, heightening vulnerabilities to financial loss and credit damage amid growing risks from real-time payments.
Story image
BackBox introduces major update to Network Vulnerability Manager
Fri, 29th Mar 2024
#
ransomware
#
breach prevention
#
security breaches
BackBox enhances network vulnerability management with an update to its Network Vulnerability Manager, allowing organisations to mark mitigated Common Vulnerabilities and Exposures, thus refining their risk scores and optimising remediation efforts.
Story image
GitGuardian introduces tool to strengthen codebase health
Fri, 29th Mar 2024
#
it automation
#
application security
#
devsecops
Cybersecurity firm GitGuardian has introduced a Software Composition Analysis module, designed to enhance the health of organisations' codebases by automating detection and remediation of vulnerabilities in software dependencies.
Story image
LG Magna e-Powertrain earns TV Rheinland's CSMS certification
Fri, 29th Mar 2024
#
advanced persistent threat protection
#
cybersecurity
#
security vulnerabilities
LG Magna e-Powertrain achieves global certification for its Cyber Security Management System, cementing compliance with impending UNECE WP.29 car cybersecurity regulations.
Story image
LG Magna earns cybersecurity certification ahead of new regulations
Wed, 27th Mar 2024
#
cybersecurity
#
certification
#
security vulnerabilities
LG Magna secures Cyber Security Management System certification ahead of new global regulations due July 2024.
Story image
Critical zero-day vulnerability in D-Link routers exposes thousands
Wed, 27th Mar 2024
#
cybersecurity
#
d-link
#
botnet
Ensign InfoSecurity reveals a zero-day vulnerability in D-Link DIR-822 routers, putting users at risk of cyber attacks including data theft.
Story image
New study exposes flaw-riddled corporate web applications
Tue, 19th Mar 2024
#
cryptocurrency
#
blockchain
#
software development
Kaspersky study unveils that between 2021-2023, access control and data protection flaws were found in numerous corporate web applications.
Story image
A proactive approach to cyber and physical security
Wed, 13th Mar 2024
#
encryption
#
advanced persistent threat protection
#
physical security
Recent Genetec survey reveals a rising awareness of cyber threats targeting physical security systems, sparking increased investment in cybersecurity resources and protocols.