TechDay UK - The United Kingdom's, technology news network

Security vulnerabilities stories - Page 14

Story image
How zero trust and SD-WANs can support productive remote working
Tue, 17th May 2022
#
malware
#
firewalls
#
network infrastructure
The global pandemic has redefined connectivity, leading to new challenges for IT teams and the need for strong cybersecurity measures.
Story image
Developments in phishing and how to protect your business
Mon, 9th May 2022
#
dr
#
phishing
#
email security
Phishing attacks are becoming more organized and dangerous. This article discusses strategies to defend against them.
Story image
NCSC, international partners issue cyber security advisory
Fri, 29th Apr 2022
#
advanced persistent threat protection
#
cybersecurity
#
ncsc
NCSC issues cyber security advisory with international partners, highlighting 15 most commonly exploited vulnerabilities.
Story image
Attacks on critical infrastructure continue - Trellix report
Wed, 27th Apr 2022
#
ai security
#
ai
#
healthtech
Individual consumers are the prime target of cyber criminals, followed by the healthcare sector, according to a report by Trellix's Threat Labs.
Story image
Vulnerabilities on the rise - public sector at risk
Fri, 8th Apr 2022
#
digital transformation
#
cybersecurity
#
public sector
New Invicti Research has found that vulnerabilities are rising, and that government and education sectors are particularly at risk.
Story image
Widespread threats increase by 38% in 2021 - Rapid7 report
Wed, 30th Mar 2022
#
cybersecurity
#
security vulnerabilities
#
research
Rapid7 has released its latest Vulnerability Intelligence Report detailing the most significant security vulnerabilities and cyber attacks in 2021.
Story image
Four ways to secure cloud workloads and your crown jewels
Tue, 29th Mar 2022
#
iam
#
edr
#
cybersecurity
Cloud workloads are vulnerable to a variety of attacks. Understanding why and adopting runtime protection is crucial.
Story image
The patch management challenge
Tue, 29th Mar 2022
#
supply chain & logistics
#
breach prevention
#
cybersecurity
We all know that patching is important, so why is the physical process for updating systems across the enterprise still so difficult?.
Story image
New report shows increase of ICS vulnerabilities in critical infrastructure
Thu, 3rd Mar 2022
#
iot
#
breach prevention
#
cybersecurity
The number of vulnerabilities in Industrial Control Systems (ICS) has surged by 110% in the past four years, according to a report by Claroty.
Story image
Five cyber threat trends and what they mean to your business
Fri, 25th Feb 2022
#
malware
#
ransomware
#
cloud security
Global cybercrime is on the rise, posing risks to businesses. Accenture has released a report on key cyber threat trends.
Story image
Kaspersky uncovers multiple vulnerabilities in wearable tracking technology
Thu, 3rd Feb 2022
#
wearables
#
cybersecurity
#
healthtech
Kaspersky finds 33 vulnerabilities in protocol for transmitting data from wearable devices, including 18 critical ones in 2021 alone.
Story image
Qualys adds advanced remediation capabilities to Cloud Platform
Wed, 2nd Feb 2022
#
risk & compliance
#
cloud services
#
software
The new update enables organisations to fix asset misconfigurations, patch OS and third-party applications, and deploy custom software.
Story image
Nucleus Security teams up with Mandiant to enhance vulnerability management programs with threat intelligence
Wed, 2nd Feb 2022
#
advanced persistent threat protection
#
partner programmes
#
risk & compliance
Nucleus Security has entered into a strategic partnership with Mandiant, the leader in dynamic cyber defense and response.
Story image
Container adoption approaching maturity at expense of security best practices
Thu, 27th Jan 2022
#
devops
#
application security
#
devsecops
More than 75% of running containers have vulnerabilities, partly as a result of ignoring security and operational best practices.
Story image
Supply chain vulnerability identified in SAP transport system
Fri, 21st Jan 2022
#
supply chain & logistics
#
software development
#
sap
Supply chain attacks on SAP software distribution process allow internal attackers to intervene undetected, says SecurityBridge. A patch has been released.
Story image
Vulnerabilities pose danger to SonicWall SMA 100 remote access appliances
Thu, 20th Jan 2022
#
iam
#
sonicwall
#
security vulnerabilities
SonicWall and Australia’s ACSC are urging all businesses using SonicWall SMA 100 Series appliances to patch the devices as soon as possible.
Story image
Hundreds of Australian corporations identified with email security vulnerabilities
Tue, 11th Jan 2022
#
phishing
#
email security
#
security vulnerabilities
A security researcher from CanIPhish.com has discovered over 200 well-known Australian corporations with email security vulnerabilities.
Story image
Gartner explains what security leaders need to know, and do, about Log4j
Tue, 28th Dec 2021
#
malware
#
ransomware
#
cybersecurity
Log4j vulnerability prompts urgent action from security leaders. Gartner's Jonathan Care explains risks and steps to take.
Story image
A new tool to help the MSP community combat Log4j
Mon, 27th Dec 2021
#
partner programmes
#
cybersecurity
#
managed services
Datto is encouraging all MSPs to download a free script developed and made available on GitHub for any Remote Monitoring and Management solution.
Story image
1 in 10 servers and web apps vulnerable to Log4Shell
Mon, 27th Dec 2021
#
datacentre infrastructure
#
advanced persistent threat protection
#
cybersecurity
Only 70% of organizations have scanned for the Log4Shell vulnerability, leaving 10% of assessed assets vulnerable, warns cybersecurity firm Tenable.