ChannelLife UK - Industry insider news for technology resellers

Common Vulnerabilities and Exposures (CVE) stories - Page 16

Story image
Claroty finds four vulnerabilities in Schneider Electric OT device
Thu, 19th Nov 2020
#
datacentre infrastructure
#
encryption
#
power / energy
Unmitigated vulnerabilities could give an attacker access to the device, enabling the attacker to break encryption, modify code, and run certain commands.
Story image
2020's most wanted malware: Trickbot and Emotet trojans driving spike in ransomware attacks
Tue, 10th Nov 2020
#
malware
#
ransomware
#
cybersecurity
Trickbot and Emotet are being used to distribute ransomware against hospitals globally, according to research from Check Point.
Story image
Securing SAP to ensure better operational security
Thu, 8th Oct 2020
#
cybersecurity
#
sap
#
cybersafety
Australian government warns of growing cybercrime threat; organisations' intellectual property and financial information at risk.
Story image
McAfee finds vulnerabilities in 'temi' the videoconferencing robot
Tue, 22nd Sep 2020
#
robots
#
uc
#
casb
Temi is commonly used in environments including businesses, healthcare, retail, hospitality, and other environments including the home.
Story image
Malware and email scams targeting employees spread rapidly in Q2
Fri, 18th Sep 2020
#
malware
#
vpns
#
email security
Malware exploiting a decade-old Microsoft Office vulnerability has surged by 400%, according to a study by NordVPN.
Story image
OT networks warned of vulnerabilities in CodeMeter software
Wed, 16th Sep 2020
#
iot
#
industrial iot
#
security vulnerabilities
Manufacturers using Wibu-Systems CodeMeter are urged to update to version 7.10 due to vulnerabilities that could allow attackers to take control of OT networks.
Story image
Ripple20 threat has potential for 'vast exploitation', ExtraHop researchers find
Tue, 15th Sep 2020
#
advanced persistent threat protection
#
ndr
#
healthtech
One in three IT environments vulnerable to Ripple20 cyber threat, says ExtraHop. Attackers can exploit 19 vulnerabilities in the Treck networking stack.
Story image
Ripple20 threat could affect 35% of all IT environments – ExtraHop
Mon, 14th Sep 2020
#
advanced persistent threat protection
#
healthtech
#
extrahop
The vulnerabilities have the potential to ‘ripple’ through complex software supply chains, enabling attackers to steal data or execute code.
Story image
COVID-19 related email threats pose huge risk in 2020
Mon, 31st Aug 2020
#
advanced persistent threat protection
#
trend micro
#
cyber threats
According to the company’s annual mid-year roundup report, Trend Micro blocked 8.8 million COVID-19 related threats, nearly 92% of which were email-based.
Story image
Cyber threats on the rise for industrial control systems, new research finds
Tue, 25th Aug 2020
#
advanced persistent threat protection
#
cyber threats
#
claroty
Industrial control system (ICS) vulnerabilities are increasing due to remote access, says a report by The Claroty Research Team.
Story image
Kaspersky finds zero-day exploits in Windows OS and Internet Explorer used in targeted attack
Tue, 18th Aug 2020
#
cybersecurity
#
windows
#
internet explorer
Kaspersky uncovers zero-day exploits in Windows OS and Internet Explorer used in targeted attack, prompting security patches.
Story image
42% more plaintext HTTP servers than HTTPS counterparts - report
Wed, 5th Aug 2020
#
vpns
#
datacentre infrastructure
#
cybersecurity
Rapid7 has released a report detailing the changing internet risk landscapes of 2020, and other issues facing cybersecurity teams.
Story image
VPN vulnerabilities pose serious risk to OT Networks
Thu, 30th Jul 2020
#
ddos
#
vpns
#
security vulnerabilities
Vulnerable VPN servers and clients used in critical industries have been discovered by cybersecurity firm Claroty, potentially leading to security breaches.
Story image
Gallagher fortifies cybersecurity reporting as NZ's first CVE Numbering Authority
Wed, 29th Jul 2020
#
cybersecurity
#
security vulnerabilities
#
mitre
New Zealand-based Gallagher has become an authorised CVE Numbering Authority, allowing it to assign and communicate security vulnerabilities in its products.
Story image
RedShield develops 'virtual shield' to protect against SAP RECON vulnerability
Fri, 24th Jul 2020
#
sap
#
security vulnerabilities
#
redshield
The vulnerability (CVE-2020-6287) could allow attackers to take over SAP systems by remotely accessing the server.
Story image
DNS recursive resolvers vulnerability can launch DDoS attacks against any victim
Fri, 5th Jun 2020
#
ddos
#
radware
#
cyber attacks
A newly discovered vulnerability in DNS resolvers, dubbed NXNSAttack, enables cybercriminals to launch highly amplified DDoS attacks, warns Radware.
Story image
Cisco ASA firewall users urged to patch systems now
Mon, 11th May 2020
#
firewalls
#
network infrastructure
#
network security
Since early January 2020, the number of internet-accessible Cisco ASA devices considered vulnerable has jumped from 170,000 to 220,000.
Story image
COVID-19: How analysis of IoT devices highlights our changing behaviour
Thu, 7th May 2020
#
data analytics
#
martech
#
iot
COVID-19 has reshaped consumer and enterprise behaviour, as revealed by ExtraHop's IoT device analysis, highlighting long-term security risks.
Story image
Trustwave report highlights biggest cybersecurity trends of today
Mon, 27th Apr 2020
#
advanced persistent threat protection
#
trustwave
#
cyber threats
As organisations transition to the cloud, Trustwave's new report shows a doubling in cloud service attacks, marking a significant shift in cyber threats.
Story image
Unfixable vulnerability found in Intel chipsets 'impossible' to detect
Mon, 9th Mar 2020
#
cybersecurity
#
personal computing devices
#
intel
Positive Technologies says it is ‘impossible’ to detect this kind of key breach, and no firmware updates can fix the vulnerability.