TechDay Australia - Australia's technology news network

Exploits stories - Page 2

Gettyimages 1354326423

Secureworks finds Iranian threat group back with new persona

Wed, 1st Feb 2023
#
advanced persistent threat protection
#
disruption
#
data leak
Secureworks has found that the Iranian threat group, Cobalt Sapling, has reemerged with a new persona, Abraham's Ax.
Gettyimages 1355804078

Claroty's Team82 finds vulnerabilities in historian server

Thu, 19th Jan 2023
#
breach prevention
#
cybersecurity
#
data breach
Claroty's research team, Team82, has examined the GE Proficy Historian, finding five exploitable vulnerabilities capable of causing damage to the system.
Gettyimages 497953315

GreyNoise Intelligence identifies exploitation threats for 2023

Fri, 23rd Dec 2022
#
uc
#
advanced persistent threat protection
#
cybersecurity
GreyNoise Intelligence unveils its 2022 Mass Exploitation Report, delving deep into threat detection events from the past year.
Gettyimages 1156955640

Lookout finds predatory behaviour on 300 loan apps

Thu, 1st Dec 2022
#
application security
#
email security
#
casb
Almost 300 loan apps found in Africa, Southeast Asia, India, Colombia, and Mexico exhibit predatory behavior, says Lookout.
Gettyimages 1208740747

Attackers use automation to increase speed from exploits

Thu, 20th Oct 2022
#
cloud security
#
exploits
#
nato
Attackers are advancing to keep pace with cloud adoption and response time, according to a new report from Lacework.
Gettyimages 1188482164  2

52% of ransomware incidents started with compromise of unpatched remote services

Thu, 6th Oct 2022
#
ransomware
#
cybersecurity
#
secureworks
The exploitation in remote services has become the primary initial access vector in ransomware attacks over the past year.
Gettyimages 1367402313

Dramatic uptick in threat activity with exploits growing nearly 150%

Thu, 11th Aug 2022
#
exploits
#
cyber attacks
#
log4j
Threat activity has spiked in Q2 2022, with malware events rising by 25%, botnets doubling, and exploit activity growing almost 150%, says Nuspire's report.
Gettyimages 1144604245  7

2021 the year cyber criminals got creative - Proofpoint

Wed, 8th Jun 2022
#
supply chain
#
cybersecurity
#
proofpoint
One constant that remains as organisations approach a sense of normalcy after a disruptive year is that cyber criminals continue to target and exploit people.
Gettyimages 1299295885

New vulnerabilities found in Nuspire's Q1 2022 Threat Report

Thu, 19th May 2022
#
malware
#
ddos
#
advanced persistent threat protection
Nuspire's Q1 2022 Threat Report reveals surge in threat actor activity as new vulnerabilities emerge. Mirai, STRRAT and Emotet see a resurgence.
Gettyimages 1331943958  7

Infoblox's State of Security Report spotlights Australian remote work hazards

Wed, 18th May 2022
#
casb
#
dlp
#
cybersecurity
Attackers exploit weak WiFi, remote endpoints, and the cloud, costing 50% of organisations over $1.3 million in breach damages.
Gettyimages 1330888861

Use of malware, botnets and exploits expands in Q1 2022

Thu, 12th May 2022
#
malware
#
ddos
#
cybersecurity
Malware, botnet, and exploit activity increased in Q1 2022, according to a report by managed security services provider Nuspire.
Gettyimages 497571818

WordPress vulnerabilities more than doubled in 2021

Thu, 13th Jan 2022
#
risk & compliance
#
cybersecurity
#
wordpress
WordPress vulnerabilities have more than doubled in 2021, with 77% of them being exploitable, according to Risk Based Security.
Positive tech

Companies exploited by high-risk vulnerabilities, new research shows

Wed, 4th Nov 2020
#
security vulnerabilities
#
exploits
#
positive technologies
84% of companies have high-risk vulnerabilities on their network perimeter, with half of them fixable through software updates, says Positive Technologies.
Irisk

Radiflow launches iRISK for greater visibility into risk and vulnerability

Tue, 11th Feb 2020
#
exploits
#
cyber risk
#
radiflow
Radiflow launches iRISK, a risk analytics service for industrial networks, enhancing visibility and mitigation of vulnerabilities with NIST-recommended actions.
Thinkstockphotos 501748178

US$250,000 up for grabs with Microsoft's bug bounty

Mon, 19th Mar 2018
#
cybersecurity
#
microsoft
#
microsoft azure
Microsoft has announced the Speculative Execution Side Channel Bounty Program that is offering up to USD$250,000 to people who reveal novel bugs.
Security protection anti virus software 60504

Cisco ASA appliances at risk of denial of service exploit

Tue, 13th Feb 2018
#
cisco
#
exploits
#
acsc
The Australian Cyber Security Centre (ACSC) has issued an official alert to those who use Cisco's Adaptive Security Appliance (ASA).
Thinkstockphotos 653516378

North Korean threat group suspected to be behind Adobe Flash exploit

Mon, 5th Feb 2018
#
martech
#
breach prevention
#
adobe
An exploit that targeted an Adobe Flash vulnerability looks to be the work of a North Korean group called TEMP.Reaper.
Thinkstockphotos 624010374

Fool me once... ransomware strikes firms twice on average, survey finds

Thu, 1st Feb 2018
#
malware
#
firewalls
#
network infrastructure
Ransomware hits firms twice on average, according to a Sophos survey. Despite the presence of endpoint security, 77% of attacks breach defences.
Thinkstockphotos 511868498

ShadowPad exploit 'one of the biggest' APAC supply chain attacks

Tue, 22nd Aug 2017
#
encryption
#
supply chain
#
kaspersky
Malaysia's MyCERT warns of mass APAC supply chain breach after ShadowPad exploit hits NetSarang servers, stealing data.
Thinkstockphotos 200484500 001

WatchGuard report: 30% of all malware isn't caught by legacy AV

Mon, 8th May 2017
#
malware
#
firewalls
#
network infrastructure
WatchGuard's Quarterly Internet Security Report says that 30% of malware attacks are new or zero day exploits - and legacy AVs are missing threats.