ChannelLife UK - Industry insider news for technology resellers

Security vulnerabilities stories - Page 3

Realistic illustration hospital building digital shield cracks healthcare data security vulnerabilities

Healthcare sector slow to fix vulnerabilities despite strong prevention

Thu, 4th Sep 2025
#
data protection
#
devops
#
advanced persistent threat protection
Healthcare sector excels in preventing serious security flaws but takes nearly two months to fix them, risking sensitive data exposure amid rising cyber threats.
Bank building shadowy figures with laptops phishing hooks targeting employees illustration

Financial sector faces 25% jump in cyberattacks, led by phishing

Fri, 22nd Aug 2025
#
ransomware
#
phishing
#
advanced persistent threat protection
Cyberattacks on the financial sector have surged 25% in 2024, with phishing leading and nearly half of employees prone to clicking malicious links.
Digital illustration server room lock shattering abstract computational power

Quantum computing exposes Active Directory to urgent new risks

Fri, 8th Aug 2025
#
data protection
#
mfa
#
cloud security
Quantum computing presents urgent security risks for organisations relying on Microsoft Active Directory, as legacy systems struggle to meet new cryptographic demands.
Cloud shaped shield protecting developers at desks secure software development

Palo Alto upgrades Cortex Cloud to tackle AI-driven code risks

Thu, 7th Aug 2025
#
firewalls
#
devops
#
cloud security
Palo Alto Networks has enhanced Cortex Cloud with a new module to prevent AI-generated code risks, boosting security for faster, safer software development.
Security researcher analyzing complex network map with user icons clouds modern office

BeyondTrust launches Phantom Labs to boost identity security research

Tue, 5th Aug 2025
#
data science
#
iam
#
cybersecurity
BeyondTrust launches Phantom Labs, a specialised team to research identity security threats and enhance protection against identity exploitation in hybrid and cloud environments.
Developers engineers collaborating architectural diagrams code security modern office

Dawnguard raises USD $3m to embed security at design stage

Thu, 31st Jul 2025
#
devops
#
cloud security
#
apm
Amsterdam-based cybersecurity startup Dawnguard secures USD $3 million to embed security into system design, aiming to prevent risks from the development phase onwards.
Computer network shield icons alert symbols ai brain cybersecurity monitoring

Panaseer launches AI tool for real-time analysis of cyber risks

Wed, 30th Jul 2025
#
firewalls
#
network security
#
phishing
Panaseer has launched Key Drivers, an AI tool delivering real-time cybersecurity risk analysis to help organisations swiftly spot and address vulnerabilities.
Cloud with gears code shields surrounded by servers for it management

Azul launches Managed Services Programme for Java insights

Wed, 30th Jul 2025
#
application security
#
partner programmes
#
software development
Azul has launched a Managed Services Provider Programme to help partners offer Java asset management, security and code insights via its Intelligence Cloud platform.
Uk us office workers computers ai patterns data flows china map

Nearly 8% of UK & US staff use Chinese GenAI at work

Wed, 23rd Jul 2025
#
saas
#
data protection
#
martech
Nearly 8% of UK and US employees use Chinese generative AI tools at work, raising concerns over frequent exposure of sensitive corporate data, a study finds.
Modern uk office unattended laptops smartphones security vulnerabilities

Nearly half of UK firms hit by breaches from unmanaged devices

Tue, 22nd Jul 2025
#
advanced persistent threat protection
#
casb
#
breach prevention
Nearly half of UK firms faced data breaches last year due to unmanaged devices, revealing major security gaps amid growing hybrid work and shadow IT use.
Developers collaborating on software security fixing vulnerabilities digital shield icons

Cycode & HackerOne integrate to speed software vulnerability fixes

Fri, 18th Jul 2025
#
application security
#
risk & compliance
#
cybersecurity
Cycode and HackerOne partner to integrate bug bounty findings into Cycode's platform, speeding up vulnerability fixes and improving software security workflows.
Network server rack with shadowy figure hidden threat enterprise office

Windows Server 2025 flaw lets attackers persist in Active Directory

Thu, 17th Jul 2025
#
advanced persistent threat protection
#
iam
#
erp
A design flaw in Windows Server 2025 allows attackers to persist undetected in Active Directory by exploiting managed service account vulnerabilities.
Multiple hands grabbing gift cards digital shopping cart simultaneous redemption online checkout

Race condition in nopCommerce gift cards enables repeated use

Fri, 11th Jul 2025
#
devops
#
apm
#
e-commerce
A race condition vulnerability in nopCommerce gift cards lets attackers redeem the same card repeatedly, exploiting a flaw in the checkout process.
Modern office building split ai digital patterns and cracked security shields

Growing gap revealed between AI innovation & enterprise security

Thu, 26th Jun 2025
#
devops
#
supply chain
#
apm
A new report reveals a widening gap between AI innovation and enterprise security, with 36% of firms struggling to keep up with generative AI risks.
Digital security shield protecting interconnected app icons data streams

Outpost24 identifies key OAuth risks & best practice solutions

Sat, 21st Jun 2025
#
application security
#
iam
#
breach prevention
Outpost24 reveals seven common OAuth risks and offers best practices to help organisations prevent unauthorised access and data breaches through better token security.
Dark cloud over data servers glowing locks keys floating away risk

Poor cloud security leaves secrets & data at risk, report finds

Thu, 19th Jun 2025
#
hyperscale
#
public cloud
#
cloud security
A report finds poor cloud security and misconfigurations put sensitive data and secrets at risk across major public cloud providers worldwide.
Illustration smartphone laptop warning symbols fish hooks masked figures cyber threats apple devices

Jamf report finds phishing & infostealers surge on Apple devices

Wed, 18th Jun 2025
#
malware
#
endpoint protection
#
mdm
Jamf's Security 360 Report reveals a sharp rise in phishing and infostealers targeting Apple devices, urging organisations to strengthen cybersecurity measures.
Laptop connected to cloud icons with gears and automation symbols it automation cloud endpoint

Aiden Technologies now available in Azure Marketplace via MACC

Fri, 13th Jun 2025
#
paas
#
iaas
#
it automation
Aiden Technologies is now available in the Microsoft Azure Marketplace via MACC, enabling organisations to acquire its endpoint management platform using existing Azure funds.
Healthcare data security stethoscope server padlock uk flag motif

AI use surges in UK healthcare as data security concerns mount

Thu, 12th Jun 2025
#
data protection
#
iot
#
ai
AI use in UK healthcare has soared to 94% in 2025, despite rising data breaches and declining focus on data security among IT professionals.
Professional tech team analyzing security threats digital business logic cybersecurity

OWASP unveils first top 10 business logic abuse threats list

Fri, 6th Jun 2025
#
application security
#
cybersecurity
#
software development
OWASP has released its first Business Logic Abuse Top 10, spotlighting critical cross-domain threats beyond traditional technology-specific vulnerabilities.