TelcoNews Australia - Telecommunications news for ICT decision-makers

Security vulnerabilities stories - Page 16

Story image
RedShield develops 'virtual shield' to protect against SAP RECON vulnerability
Fri, 24th Jul 2020
#
sap
#
security vulnerabilities
#
redshield
The vulnerability (CVE-2020-6287) could allow attackers to take over SAP systems by remotely accessing the server.
Story image
Prevasio unveils threat analysis sandbox for containers
Mon, 13th Jul 2020
#
virtualisation
#
devops
#
application security
Prevasio launches industry's first dynamic threat and vulnerability analysis system for Docker containers. @PrevasioAnalyzer #Cybersecurity.
Story image
C-DATA OLT firmware has intentional backdoors, allege researchers
Mon, 13th Jul 2020
#
encryption
#
cybersecurity
#
security vulnerabilities
A range of optical line termination (OLT) devices made by China-based manufacturer and vendor C-DATA may be riddled with vulnerabilities and backdoors.
Story image
IOTDC extends data centre services in Port Melbourne and beyond
Thu, 9th Jul 2020
#
hyperscale
#
dc
#
colocation
IOT Data Centers adds new facility in Melbourne to its network of geographically distributed data centers. Now accepting customers.
Story image
Cisco ASA firewall users urged to patch systems now
Mon, 11th May 2020
#
firewalls
#
network infrastructure
#
network security
Since early January 2020, the number of internet-accessible Cisco ASA devices considered vulnerable has jumped from 170,000 to 220,000.
Story image
Microsoft IE vulnerability to go unpatched until mid-Feb
Tue, 28th Jan 2020
#
microsoft
#
internet explorer
#
zero day malware
A blog post from security vendor ESET has outlined the risk of the zero-day for those who are still using the relic browser of internet-past.
Story image
Zero-day Internet Explorer vulnerability exploited in the wild
Wed, 25th Sep 2019
#
microsoft
#
security vulnerabilities
#
patching
Microsoft released an out-of-band patch for the vulnerability discovered by Google researchers due to the report that it has been exploited in the wild.
Story image
GitHub amps up vulnerability reporting capabilities
Fri, 20th Sep 2019
#
martech
#
apm
#
cybersecurity
GitHub has announced new capabilities that make it easier for developers to report vulnerabilities directly from their repositories.
Story image
Apple issues clarification on extent of iOS malware infection
Wed, 11th Sep 2019
#
endpoint protection
#
edr
#
personal computing devices
Apple clarifies that an iOS malware attack impacted fewer than a dozen Uighur-focused websites, dismissing Google's claims of mass exploitation.
Story image
Security flaw left Android phones open to SMS phishing attacks found
Tue, 10th Sep 2019
#
smartphones
#
endpoint protection
#
phishing
A security flaw in Samsung, Huawei, LG, Sony and other Android phones leaves users open to SMS phishing attacks, Check Point Research reports.
Story image
How the iPhone malware discovery affects Apple users – Malwarebytes
Wed, 4th Sep 2019
#
smartphones
#
malware
#
cybersecurity
The malware implant has been patched, but iPhone users should ensure they’re running on the latest version of iOS (12.1.4) to leverage the security patches.
Story image
Puppet launches vulnerability remediation product
Thu, 22nd Aug 2019
#
it automation
#
cybersecurity
#
security vulnerabilities
With vulnerabilities and security breaches on the rise, the latest Puppet product helps IT teams find, prioritise and remediate vulnerabilities.
Story image
Popular enterprise printers riddled with security risks
Thu, 15th Aug 2019
#
hp
#
printing
#
brother
Researchers from NCC Group analysed different aspects of six mid-range enterprise printers manufactured by HP, Ricoh, Xerox, Lexmark, Kyocera, and Brother.
Story image
Check Point: Attackers executing commands remotely with latest malware
Wed, 14th Aug 2019
#
malware
#
iot security
#
cybersecurity
Threat actors are quick to try and exploit new vulnerabilities when they emerge, before organisations have had the chance to patch them.
Story image
F5 Networks' BIG-IP load balancer product vulnerable to attack
Tue, 13th Aug 2019
#
f5 networks
#
f-secure
#
security vulnerabilities
Security vulnerabilities in F5 Networks' popular BIG-IP load balancer could enable attackers to exploit iRules and gain unauthorised access, warns F-Secure.
Story image
Cohesity launches new vulnerability scan using backup data
Tue, 6th Aug 2019
#
cybersecurity
#
security vulnerabilities
#
cohesity
The application works by scanning backup copies on to identify any vulnerabilities across an organisation’s IT environment.
Story image
Vulnerabilities in cloud containers soar, report finds
Wed, 31st Jul 2019
#
cloud services
#
security vulnerabilities
#
containers
Cloud container vulnerabilities are on the rise, increasing by 46% compared to last year, according to Skybox Security's latest report.
Story image
Huawei working to patch critical security vulnerabilities
Wed, 10th Jul 2019
#
security vulnerabilities
#
huawei
#
swascan
Huawei collaborates with Swascan to patch critical security flaws, underscoring that even tech giants like Adobe, Microsoft, and Lenovo are vulnerable.
Story image
UPDATED: Orvibo & Arlo smart home products patched to prevent attacks
Fri, 5th Jul 2019
#
vpns
#
surveillance
#
smart home
The security of smart home devices is once again under the spotlight this week, as two different device manufacturers come under fire for major vulnerabilities.
Story image
Major vulnerability found Electronic Arts gaming client
Thu, 27th Jun 2019
#
gaming
#
digital entertainment
#
security vulnerabilities
Once exploited, the vulnerabilities would have led to player account takeover and identity theft, Check Point and CyberInt found.