Exploits stories - Page 1
Tenable unveils autonomous solution for patch management
Last week
#
cloud security
#
it automation
#
risk & compliance
Tenable has launched Tenable Patch Management, an autonomous solution designed to streamline vulnerability remediation amid increasing cyber threats.
Opus security unveils advanced AI-driven vulnerability engine
Wed, 11th Sep 2024
#
risk & compliance
#
ai
#
collaboration
Opus Security unveils its AI-powered Advanced Multi-Layered Prioritization Engine, revolutionising how organisations manage and address vulnerabilities.
RedTail cryptomining malware exploits new Palo Alto flaw
Mon, 3rd Jun 2024
#
cryptocurrency
#
blockchain
#
cybersecurity
Hackers exploiting newly found vulnerability in Palo Alto’s PAN-OS are using RedTail malware to enhance cryptomining operations, raising cybersecurity alarms.
Rapid7's 2024 report reveals surge in zero-day exploits
Wed, 22nd May 2024
#
mfa
#
advanced persistent threat protection
#
exploits
Rapid7’s 2024 Attack Intelligence Report highlights a sharp rise in zero-day vulnerabilities causing mass breaches and underscores the necessity for faster patching and robust MFA protocols.
Record rise in zero-day vulnerabilities exposed in Google-Mandiant report
Tue, 2nd Apr 2024
#
smartphones
#
advanced persistent threat protection
#
personal computing devices
Google and Mandiant's cybersecurity report reveals a 50% rise in exploited zero-day vulnerabilities in 2023, with China being the leading perpetrator.
New Relic releases interactive security testing with proof-of-exploit reports
Thu, 14th Mar 2024
#
application security
#
devsecops
#
apm
New Relic's observability platform now offers Interactive Application Security Testing (IAST) with a proof-of-exploit reporting feature, enabling real-time identification and fixing of application vulnerabilities before code deployment.
Cybersecurity is your defensive strategy, cyber resilience is your business
Fri, 16th Feb 2024
#
ransomware
#
cybersecurity
#
disruption
In light of the massive cybersecurity breach impacting Ivanti solutions, firms are urged to embrace cyber resilience for business continuity, demonstrating greater fortitude against potential disruptions.
Data Theorem sweeps 2023 CyberSecured Awards with cloud & mobile protections
Thu, 28th Dec 2023
#
application security
#
multi-cloud
#
cybersecurity
Data Theorem's Cloud Secure and Mobile Protect acclaimed for top cloud security and mobile API threat protection at 2023 CyberSecured Awards.
First Azul State of Java survey reveals Java's crucial role in tech industry
Wed, 25th Oct 2023
#
private cloud
#
hybrid cloud
#
public cloud
Azul's inaugural State of Java survey highlights Java's vital role in global tech, with 98% of firms reporting usage.
Cequence brings API protection to HPE GreenLake Marketplace
Wed, 18th Oct 2023
#
risk & compliance
#
hpe
#
fraud
Cequence Security offers first-ever API protection on the HPE GreenLake Marketplace, promoting visibility, reduced costs, and minimised business risks.
Telegram, AWS, and Alibaba Cloud targeted in latest supply chain attack
Fri, 13th Oct 2023
#
hyperscale
#
public cloud
#
supply chain & logistics
An attacker attempted to exploit the open-source community by uploading a series of malicious packages to the PyPi package manager.
Recorded Future discloses new high-risk vulnerabilities
Tue, 19th Sep 2023
#
risk & compliance
#
microsoft
#
zero day malware
Recorded Future's monthly report reveals high-risk vulnerabilities, exploit chains, and zero-day vulnerabilities affecting Microsoft and Ivanti products.
CyFox identifies critical hijacking vulnerability in popular streaming software
Thu, 3rd Aug 2023
#
physical security
#
digital entertainment
#
software development
Critical hijacking vulnerability in Stremio 4.4 puts 5 million users at risk; remote code execution and information theft possible.
Claroty reveals five vulnerabilities in NETGEAR RAX30 routers
Fri, 19th May 2023
#
iot
#
cybersecurity
#
healthtech
Claroty’s research arm, Team82, has disclosed five vulnerabilities in NETGEAR’s RAX30 routers they discovered at the Pwn2Own Toronto hacking competition.
Attackers deploying exploits faster than ever, finds Rapid7
Wed, 1st Mar 2023
#
risk & compliance
#
cybersecurity
#
security vulnerabilities
Rapid7 Vulnerability Intelligence Report finds attackers developing and deploying exploits faster, with an 87% increase in first-week exploitation since 2020.
Secureworks finds Iranian threat group back with new persona
Wed, 1st Feb 2023
#
advanced persistent threat protection
#
disruption
#
data leak
Secureworks has found that the Iranian threat group, Cobalt Sapling, has reemerged with a new persona, Abraham's Ax.
Claroty’s Team82 finds vulnerabilities in historian server
Thu, 19th Jan 2023
#
breach prevention
#
cybersecurity
#
data breach
Claroty's research team, Team82, has examined the GE Proficy Historian, finding five exploitable vulnerabilities capable of causing damage to the system.
GreyNoise Intelligence identifies exploitation threats for 2023
Fri, 23rd Dec 2022
#
uc
#
advanced persistent threat protection
#
cybersecurity
GreyNoise Intelligence unveils its 2022 Mass Exploitation Report, delving deep into threat detection events from the past year.
Lookout finds predatory behaviour on 300 loan apps
Thu, 1st Dec 2022
#
application security
#
email security
#
casb
Almost 300 loan apps found in Africa, Southeast Asia, India, Colombia, and Mexico exhibit predatory behavior, says Lookout.
Attackers use automation to increase speed from exploits
Thu, 20th Oct 2022
#
cloud security
#
exploits
#
automation
Attackers are advancing to keep pace with cloud adoption and response time, according to a new report from Lacework.