ChannelLife UK - Industry insider news for technology resellers

Common Vulnerabilities and Exposures (CVE) stories - Page 19

Story image
Mobile apps are now a crucial part of event promotion
Tue, 14th Aug 2018
#
digital transformation
#
mobile apps
#
cvent australia
If you’re thinking of running an event, a mobile app is not just a nice feature but an essential part of event promotion.
Story image
A deep dive into the present and future of retail off- and online
Wed, 1st Aug 2018
#
martech
#
commerce systems
#
omnichannel
Russell McVeagh Special Counsel Liz Blythe examines the opportunities and risks associated with the eye-wateringly quick pace of change in the sector.
Story image
Exclusive: Why open source is critical to software development
Mon, 23rd Jul 2018
#
dr
#
cloud security
#
open source
Pivotal APJ head Lawrence Crowther discusses the importance of open source and cloud in modern software development.
Story image
GitHub rolls out security alerts feature for Python
Mon, 16th Jul 2018
#
martech
#
apm
#
software development
GitHub adds security alerts for Python, allowing users to be notified when their code depends on packages with known vulnerabilities.
Story image
Use of banking trojans up 50%, cryptomining still dominant malware – report
Tue, 10th Jul 2018
#
malware
#
cybersecurity
#
trojan
Check Point’s latest Global Threat Index reveals that Trojan malware families enter Top 10 Most Wanted Ranking; Cryptomining remains top of the list.
Story image
The top four security strategies and why they’re so effective
Mon, 21st May 2018
#
malware
#
ransomware
#
cybersecurity
The top four cybersecurity strategies, including application whitelisting and patching, are proving highly effective against 85% of attacks like ransomware.
Story image
Noel Leeming hit by nine charges of breaching consumer rights
Mon, 30th Apr 2018
#
commerce commission
#
noel leeming
#
the warehouse group
The consumer retail, owned by The Warehouse Group, will defend the nine charges, each laid by different customers, in court at the end of May.
Story image
No need for a browser - XMRig cryptomining malware enters top 10 most wanted malware list
Mon, 16th Apr 2018
#
cryptocurrency
#
blockchain
#
cryptomining
Cryptomining malware is shifting its focus from browsers to endpoints, with XMRig rising in popularity among cybercriminals.
Story image
'URL file outbreak' used to distribute Quant Loader Trojan
Wed, 11th Apr 2018
#
malware
#
firewalls
#
ransomware
Barracuda Networks is tracking a potentially dangerous ‘URL file outbreak’ that distribute the Quant Loader Trojan.
Story image
Attackers exploit macro-less Office documents to create havoc
Tue, 3rd Apr 2018
#
malware
#
firewalls
#
network infrastructure
Cybercriminals use Microsoft Office documents to conduct ‘macro-less’ attacks that dodge organisations’ defences and inject malware.
Story image
Christchurch social enterprise convention nabs prize at global event awards
Mon, 26th Mar 2018
#
social enterprise
#
akina
#
social enterprise world forum
Christchurch's Social Enterprise World Forum 2017 secures a strong second for Best Conference at Eventex Award, showcasing positive global change.
Story image
China cyberespionage group targets US maritime & engineering sectors
Mon, 19th Mar 2018
#
malware
#
breach prevention
#
cybersecurity
A China-based cyberespionage group may be targeting United States engineering and maritime industries tied up in activities about the South China Sea.
Story image
New research finds China tampering with public vulnerability data
Mon, 12th Mar 2018
#
cybersecurity
#
fraud
#
cybercrime
Recorded Future believes China has been altering public vulnerability data to allow the Ministry of State Security to play with it first.
Story image
REPORT: Ransomware decreasing in quantity but increasing in potency
Wed, 7th Mar 2018
#
malware
#
ransomware
#
cybersecurity
A new report from SonicWall has shed light on the current threat landscape with the company recording an astonishing 9.32b malware attacks in 2017.
Story image
Chinese websites targeted in drive-by download attack that drops DDoS bot
Tue, 27th Feb 2018
#
ddos
#
botnet
#
malwarebytes
Chinese websites are under siege by a drive-by download campaign planting the decade-old Avzhan DDoS bot, Malwarebytes Labs reveals.
Story image
State-sponsored North Korean cyberespionage group continues to weaponize tactics
Wed, 21st Feb 2018
#
breach prevention
#
healthtech
#
fireeye
The North Korean threat group known to some as Reaper (APT37) is eyeing bigger targets with more sophisticated tactics.
Story image
Organisations speak out against sexual harassment in the workplace
Mon, 19th Feb 2018
#
dei
#
esg
#
russell mcveagh
Allegations of staff engaging in sexually inappropriate behaviour at one of New Zealand’s top law firms demonstrates the need for robust policies.
Story image
New email spam campaign ditches traditional Office macro infection tactic
Mon, 19th Feb 2018
#
malware
#
email security
#
cybersecurity
A new wave of spam emails use Microsoft Office documents to download password stealers without having to activate Macros.
Story image
ASUSTOR responds to Spectre & Meltdown with ADM update
Wed, 14th Feb 2018
#
intel
#
asustor
#
spectre
ASUSTOR is releasing updates to its ADM this week as part of its efforts to fix the Meltdown security vulnerabilities.
Story image
Cisco ASA appliances at risk of denial of service exploit
Tue, 13th Feb 2018
#
cisco
#
exploits
#
acsc
The Australian Cyber Security Centre (ACSC) has issued an official alert to those who use Cisco’s Adaptive Security Appliance (ASA).