IT Brief UK - Technology news for CIOs & IT decision-makers

Common Vulnerabilities and Exposures (CVE) stories - Page 17

Screen shot 2018 10 03 at 3

Huge vulnerabilities in software supply chain being exploited

Thu, 4th Oct 2018
#
devops
#
supply chain
#
apm
A very exposing report has revealed breaches are rising and response times are falling, largely due to shoddy software development practices.
Img hog1vzd5owi3vpiehyp7urqi

Quick thinking remedies vulnerability in Schneider Electric ICS controller

Fri, 7th Sep 2018
#
datacentre infrastructure
#
power / energy
#
schneider electric
Radiflow discovered that a serious vulnerability in the devices put the safety and availability of ICS networks in jeopardy.
Cybersecurity breach2

Over 2,300 data breaches disclosed so far in 2018 - report

Mon, 20th Aug 2018
#
phishing
#
email security
#
breach prevention
Phishing for and using the stolen credentials to access systems or services stands out as a particularly popular attack method.
Screen shot 2018 08 15 at 11

Exclusive interview: Major MFA vulnerability discovered in Microsoft's ADFS

Wed, 15th Aug 2018
#
mfa
#
iam
#
cybersecurity
A critical flaw in Microsoft's ADFS allows bypassing MFA, posing a severe risk, warns Okta's REX team. Urgent patching is recommended for users.
Gettyimages 1327245423

A deep dive into the present and future of retail off- and online

Wed, 1st Aug 2018
#
martech
#
commerce systems
#
omnichannel
Russell McVeagh Special Counsel Liz Blythe examines the opportunities and risks associated with the eye-wateringly quick pace of change in the sector.
Thinkstockphotos 547244256

GitHub rolls out security alerts feature for Python

Mon, 16th Jul 2018
#
martech
#
apm
#
software development
GitHub adds security alerts for Python, allowing users to be notified when their code depends on packages with known vulnerabilities.
Secure banking

Use of banking trojans up 50%, cryptomining still dominant malware – report

Tue, 10th Jul 2018
#
malware
#
cybersecurity
#
trojan
Check Point's latest Global Threat Index reveals that Trojan malware families enter Top 10 Most Wanted Ranking; Cryptomining remains top of the list.
Thinkstockphotos 882835538

No need for a browser - XMRig cryptomining malware enters top 10 most wanted malware list

Mon, 16th Apr 2018
#
crypto
#
blockchain
#
cryptomining
Cryptomining malware is shifting its focus from browsers to endpoints, with XMRig rising in popularity among cybercriminals.
Thinkstockphotos 484234442

'URL file outbreak' used to distribute Quant Loader Trojan

Wed, 11th Apr 2018
#
malware
#
firewalls
#
ransomware
Barracuda Networks is tracking a potentially dangerous 'URL file outbreak' that distribute the Quant Loader Trojan.
Thinkstockphotos 862290790

China cyberespionage group targets US maritime & engineering sectors

Mon, 19th Mar 2018
#
malware
#
breach prevention
#
cybersecurity
A China-based cyberespionage group may be targeting United States engineering and maritime industries tied up in activities about the South China Sea.
Screen shot 2018 03 12 at 10

New research finds China tampering with public vulnerability data

Mon, 12th Mar 2018
#
cybersecurity
#
fraud
#
cybercrime
Recorded Future believes China has been altering public vulnerability data to allow the Ministry of State Security to play with it first.
Screen shot 2018 03 06 at 12

REPORT: Ransomware decreasing in quantity but increasing in potency

Wed, 7th Mar 2018
#
malware
#
ransomware
#
supply chain
A new report from SonicWall has shed light on the current threat landscape with the company recording an astonishing 9.32b malware attacks in 2017.
Thinkstockphotos 845260736

Chinese websites targeted in drive-by download attack that drops DDoS bot

Tue, 27th Feb 2018
#
ddos
#
botnet
#
malwarebytes
Chinese websites are under siege by a drive-by download campaign planting the decade-old Avzhan DDoS bot, Malwarebytes Labs reveals.
Thinkstockphotos 880737456

New email spam campaign ditches traditional Office macro infection tactic

Mon, 19th Feb 2018
#
malware
#
email security
#
cybersecurity
A new wave of spam emails use Microsoft Office documents to download password stealers without having to activate Macros.
Thinkstockphotos 584210798 8wnzudo

ASUSTOR responds to Spectre & Meltdown with ADM update

Wed, 14th Feb 2018
#
semiconductors
#
intel
#
asustor
ASUSTOR is releasing updates to its ADM this week as part of its efforts to fix the Meltdown security vulnerabilities.
Thinkstockphotos 481086900

Attackers unleash Lokibot malware on unpatched Windows systems

Tue, 13th Feb 2018
#
malware
#
cybersecurity
#
microsoft
Lokibot malware targets unpatched Windows systems exploiting CVE-2017-11882; researchers urge timely updates and restricted installer access to combat threats.
Pexels photo

42% of Alexa-ranked websites are open invites for attackers

Wed, 7th Feb 2018
#
uc
#
phishing
#
email security
A staggering 42% of top Alexa-ranked websites are vulnerable to cyber-attacks due to outdated software and compromised content, finds Menlo Security.
Thinkstockphotos 653516378

North Korean threat group suspected to be behind Adobe Flash exploit

Mon, 5th Feb 2018
#
martech
#
breach prevention
#
adobe
An exploit that targeted an Adobe Flash vulnerability looks to be the work of a North Korean group called TEMP.Reaper.
Thinkstockphotos 473158924

Oracle MICROS POS vulnerability may compromise 330,000 POS systems

Fri, 2nd Feb 2018
#
martech
#
commerce systems
#
supply chain
A vulnerability in Oracle's POS systems may affect more than 330,000 payment systems across the globe, putting files and sensitive information at risk.
Thinkstockphotos 476580161

Zyklon HTTP malware creates gaping backdoors through MS Office exploits

Mon, 22nd Jan 2018
#
malware
#
ddos
#
breach prevention
Zyklon HTTP malware is described as a publicly-available and fully featured backdoor that is able to conduct DDoS attacks, steal passwords...